Sciweavers

1357 search results - page 261 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
TSMC
2011
228views more  TSMC 2011»
13 years 3 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
ISN
1999
Springer
159views Communications» more  ISN 1999»
14 years 26 days ago
Accounting Management in a TINA-Based Service and Network Environment
The ACTS FlowThru project aims to build a management system which supports the flow of management information across organisational and technological domains by reusing components ...
Patrick Hellemans, Cliff Redmond, Koen Daenen, Dav...
WSCG
2004
151views more  WSCG 2004»
13 years 10 months ago
Inserting G1 Discontinuities into Free-form Features for Aesthetic Design
Free form shapes are often used to fulfil both aesthetic and design constraints applied to parametric models currently adopted in CAD environments. Up to now, designers and engine...
Vincent Cheutet, Jean-Philippe Pernot, Jean-Claude...
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 8 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
VRIPHYS
2010
13 years 3 months ago
Optimization-based Fluid Simulation on Unstructured Meshes
We present a novel approach to fluid simulation, allowing us to take into account the surface energy in a precise manner. This new approach combines a novel, topology-adaptive app...
Marek Krzysztof Misztal, Robert Bridson, Kenny Erl...