Sciweavers

832 search results - page 68 / 167
» Effect of Malicious Synchronization
Sort
View
DEXA
2000
Springer
95views Database» more  DEXA 2000»
15 years 7 months ago
Formalizing Workflows Using the Event Calculus
The event calculus is a logic programming formalism for representing events and their effects especially in database applications. This paper presents the use of the event calculus...
Nihan Kesim Cicekli, Yakup Yildirim
134
Voted
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
16 years 3 months ago
Pattern-based similarity search for microarray data
One fundamental task in near-neighbor search as well as other similarity matching efforts is to find a distance function that can efficiently quantify the similarity between two o...
Haixun Wang, Jian Pei, Philip S. Yu
CHI
2003
ACM
16 years 3 months ago
Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration
A tension exists between designers' comfort with physical artifacts and the need for effective remote collaboration: physical objects live in one place. Previous research and...
Katherine Everitt, Scott R. Klemmer, Robert Lee, J...
126
Voted
ICIP
2005
IEEE
16 years 5 months ago
Semifragile hierarchical watermarking in a set theoretic framework
We introduce a set theoretic framework for watermarking and illustrate its effectiveness by designing a hierarchical semi-fragile watermark that is tolerant to compression and all...
Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mar...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 4 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu