Sciweavers

6360 search results - page 1132 / 1272
» Attentive Presentation Agents
Sort
View
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 5 days ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
ERSHOV
2009
Springer
14 years 5 days ago
Anti-unification Algorithms and Their Applications in Program Analysis
A term t is called a template of terms t1 and t2 iff t1 = t1 and t2 = t2, for some substitutions 1 and 2. A template t of t1 and t2 is called the most specific iff for any template...
Peter E. Bulychev, Egor V. Kostylev, Vladimir A. Z...
CCGRID
2004
IEEE
14 years 1 days ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
AXMEDIS
2006
IEEE
241views Multimedia» more  AXMEDIS 2006»
14 years 1 days ago
SMIL to MPEG-4 BIFS Conversion
Traditional media, such as text, image, audio and video, have long been the main media resources and granted full support of standard desktop tools and applications. Interactive r...
Beilu Shao, Laureano Moro Velazquez, Nicolas Scari...
BPM
2006
Springer
166views Business» more  BPM 2006»
14 years 1 days ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
« Prev « First page 1132 / 1272 Last » Next »