Sciweavers

3474 search results - page 188 / 695
» Data Management in RFID Applications
Sort
View
IACR
2011
129views more  IACR 2011»
14 years 4 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
ICAS
2005
IEEE
111views Robotics» more  ICAS 2005»
15 years 10 months ago
COOP - A cooperative caching service in MANETs
Data access applications in Mobile Ad Hoc Networks (MANETs) suffer from intermittent network connections and restricted power supplies. While most of the researches focus on Media...
Yu Du, Sandeep K. S. Gupta
KDD
2008
ACM
148views Data Mining» more  KDD 2008»
16 years 5 months ago
Get another label? improving data quality and data mining using multiple, noisy labelers
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated la...
Victor S. Sheng, Foster J. Provost, Panagiotis G. ...
149
Voted
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
16 years 5 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
WOB
2004
103views Bioinformatics» more  WOB 2004»
15 years 6 months ago
An I/O Device Driver for Bioinformatics Tools: the case for BLAST
There are many bioinformatics tools that deal with input/ output (I/O) issues by using filing systems from the most common operating systems, such as Linux or MS Windows. However, ...
Renato Mauro, Sérgio Lifschitz