Sciweavers

328 search results - page 57 / 66
» Detecting critical regions in multidimensional data sets
Sort
View
JPDC
2008
217views more  JPDC 2008»
13 years 7 months ago
Parallel techniques for information extraction from hyperspectral imagery using heterogeneous networks of workstations
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. In particular, NASA is continuously gath...
Antonio J. Plaza
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 9 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 2 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
EUROGRAPHICS
2010
Eurographics
14 years 4 months ago
Uncertain 2D Vector Field Topology
We introduce an approach to visualize stationary 2D vector fields with global uncertainty obtained by considering the transport of local uncertainty in the flow. For this, we ex...
Mathias Otto, Tobias Germer, Hans-Christian Hege, ...
ESORICS
2007
Springer
14 years 1 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo