Sciweavers

1397 search results - page 224 / 280
» Application Performance of a Linux Cluster Using Converse
Sort
View
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 7 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
ISAAC
2007
Springer
109views Algorithms» more  ISAAC 2007»
14 years 1 months ago
Separating Populations with Wide Data: A Spectral Analysis
In this paper, we consider the problem of partitioning a small data sample drawn from a mixture of k product distributions. We are interested in the case that individual features a...
Avrim Blum, Amin Coja-Oghlan, Alan M. Frieze, Shuh...
ISMS
2004
Springer
14 years 1 months ago
An Interactive Parallel Multigrid FEM Simulator
Physically based modeling of deformable objects such as cloth or human tissue has grown to be very important for virtual simulations. However, interactive simulation of these nonl...
Xunlei Wu, Tolga Goktekin, Frank Tendick
CIBCB
2007
IEEE
13 years 11 months ago
Hybrid Architecture for Accelerating DNA Codeword Library Searching
-- A large and reliable DNA codeword library is the key to the success of DNA based computing. Searching for the set of reliable DNA codewords is an NP-hard problem, which can take...
Qinru Qiu, Daniel J. Burns, Qing Wu, Prakash Mukre
CCGRID
2010
IEEE
13 years 8 months ago
A Map-Reduce System with an Alternate API for Multi-core Environments
Map-reduce framework has received a significant attention and is being used for programming both large-scale clusters and multi-core systems. While the high productivity aspect of ...
Wei Jiang, Vignesh T. Ravi, Gagan Agrawal