Sciweavers

149 search results - page 13 / 30
» Characterization of Silent Stores
Sort
View
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
13 years 7 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
ICPR
2004
IEEE
14 years 8 months ago
A Hierarchical Projection Pursuit Clustering Algorithm
We define a cluster to be characterized by regions of high density separated by regions that are sparse. By observing the downward closure property of density, the search for inte...
Alexei D. Miasnikov, Jayson E. Rome, Robert M. Har...
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 8 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
ICASSP
2009
IEEE
14 years 2 months ago
Sparse decomposition of mixed audio signals by basis pursuit with autoregressive models
We develop a framework to detect when certain sounds are present in a mixed audio signal. We focus on the regime where out of a large number of possible sounds, a small but unknow...
Youngmin Cho, Lawrence K. Saul
CCS
2010
ACM
14 years 2 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...