Sciweavers

155 search results - page 11 / 31
» Accessing Multimodal Meeting Data: Systems, Problems and Pos...
Sort
View
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 1 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
IJHPCA
2010
105views more  IJHPCA 2010»
13 years 6 months ago
A Pipelined Algorithm for Large, Irregular All-Gather Problems
We describe and evaluate a new, pipelined algorithm for large, irregular all-gather problems. In the irregular all-gather problem each process in a set of processes contributes in...
Jesper Larsson Träff, Andreas Ripke, Christia...
STORAGESS
2006
ACM
14 years 1 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
EVOW
2006
Springer
13 years 11 months ago
Mining Structural Databases: An Evolutionary Multi-Objetive Conceptual Clustering Methodology
Abstract. The increased availability of biological databases containing representations of complex objects permits access to vast amounts of data. In spite of the recent renewed in...
Rocío Romero-Záliz, Cristina Rubio-E...
ICDT
2005
ACM
131views Database» more  ICDT 2005»
14 years 1 months ago
Algorithms for the Database Layout Problem
We present a formal analysis of the database layout problem, i.e., the problem of determining how database objects such as tables and indexes are assigned to disk drives. Optimizin...
Gagan Aggarwal, Tomás Feder, Rajeev Motwani...