Sciweavers

10819 search results - page 2016 / 2164
» Addition and multiplication of sets
Sort
View
SRDS
2010
IEEE
13 years 8 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
WEBI
2010
Springer
13 years 8 months ago
DSP: Robust Semi-supervised Dimensionality Reduction Using Dual Subspace Projections
High-dimensional data usually incur learning deficiencies and computational difficulties. We present a novel semi-supervised dimensionality reduction technique that embeds high-dim...
Su Yan, Sofien Bouaziz, Dongwon Lee
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 8 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
ICDM
2009
IEEE
169views Data Mining» more  ICDM 2009»
13 years 8 months ago
Learning the Shared Subspace for Multi-task Clustering and Transductive Transfer Classification
There are many clustering tasks which are closely related in the real world, e.g. clustering the web pages of different universities. However, existing clustering approaches neglec...
Quanquan Gu, Jie Zhou
CCGRID
2010
IEEE
13 years 7 months ago
Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds
Data-intensive parallel applications on clouds need to deploy large data sets from the cloud's storage facility to all compute nodes as fast as possible. Many multicast algori...
Tatsuhiro Chiba, Mathijs den Burger, Thilo Kielman...
« Prev « First page 2016 / 2164 Last » Next »