Sciweavers

832 search results - page 68 / 167
» Effect of Malicious Synchronization
Sort
View
DEXA
2000
Springer
95views Database» more  DEXA 2000»
14 years 2 months ago
Formalizing Workflows Using the Event Calculus
The event calculus is a logic programming formalism for representing events and their effects especially in database applications. This paper presents the use of the event calculus...
Nihan Kesim Cicekli, Yakup Yildirim
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
14 years 10 months ago
Pattern-based similarity search for microarray data
One fundamental task in near-neighbor search as well as other similarity matching efforts is to find a distance function that can efficiently quantify the similarity between two o...
Haixun Wang, Jian Pei, Philip S. Yu
CHI
2003
ACM
14 years 10 months ago
Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration
A tension exists between designers' comfort with physical artifacts and the need for effective remote collaboration: physical objects live in one place. Previous research and...
Katherine Everitt, Scott R. Klemmer, Robert Lee, J...
ICIP
2005
IEEE
14 years 11 months ago
Semifragile hierarchical watermarking in a set theoretic framework
We introduce a set theoretic framework for watermarking and illustrate its effectiveness by designing a hierarchical semi-fragile watermark that is tolerant to compression and all...
Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mar...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 11 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu