Sciweavers

1108 search results - page 145 / 222
» Clustered Level Planarity
Sort
View
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 10 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
IPMI
2009
Springer
14 years 4 months ago
Exploratory fMRI Analysis without Spatial Normalization
Abstract. We present an exploratory method for simultaneous parcellation of multisubject fMRI data into functionally coherent areas. The method is based on a solely functional repr...
Danial Lashkari, Polina Golland
CSE
2009
IEEE
14 years 4 months ago
Real World Routing Using Virtual World Information
—In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant ...
Pan Hui, Nishanth R. Sastry
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
14 years 4 months ago
Heterogeneous coarse-grained processing elements: A template architecture for embedded processing acceleration
Reconfigurable Architectures are good candidates for application accelerators that cannot be set in stone at production time. FPGAs however, often suffer from the area and perfor...
Giovanni Ansaloni, Paolo Bonzini, Laura Pozzi
ICSM
2009
IEEE
14 years 4 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...