Sciweavers

10819 search results - page 1939 / 2164
» Addition and multiplication of sets
Sort
View
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
14 years 8 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
ICCAD
2002
IEEE
92views Hardware» more  ICCAD 2002»
14 years 7 months ago
ECO algorithms for removing overlaps between power rails and signal wires
Design ECO commonly happens in industry due to constraints or target changes from manufacturing, marketing, reliability, or performance. At each step, designers usually want to mo...
Hua Xiang, Kai-Yuan Chao, D. F. Wong
IUI
2009
ACM
14 years 7 months ago
Intelligently creating and recommending reusable reformatting rules
When users combine data from multiple sources into a spreadsheet or dataset, the result is often a mishmash of different formats, since phone numbers, dates, course numbers and ot...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
CVPR
2010
IEEE
14 years 7 months ago
Toward Coherent Object Detection And Scene Layout Understanding
Detecting objects in complex scenes while recovering the scene layout is a critical functionality in many vision-based applications. Inspired by the work of [18], we advocate the ...
Yingze Bao, Min Sun, Silvio Savarese
WWW
2010
ACM
14 years 5 months ago
Measurement-calibrated graph models for social network experiments
Access to realistic, complex graph datasets is critical to research on social networking systems and applications. Simulations on graph data provide critical evaluation of new sys...
Alessandra Sala, Lili Cao, Christo Wilson, Robert ...
« Prev « First page 1939 / 2164 Last » Next »