Sciweavers

1018 search results - page 134 / 204
» Generative unbinding of names
Sort
View
HICSS
2005
IEEE
164views Biometrics» more  HICSS 2005»
14 years 2 months ago
An Efficient Technique for Frequent Pattern Mining in Real-Time Business Applications
Association rule mining in real-time is of increasing thrust in many business applications. Applications such as e-commerce, recommender systems, supply-chain management and group...
Rajanish Dass, Ambuj Mahanti
QSHINE
2005
IEEE
14 years 2 months ago
On the Variable Capacity Property of CC/DS-CDMA Systems
—A complete complementary code based direct sequence code division multiple access (CC/DS-CDMA) system has been proposed recently as a potential candidate for beyond third genera...
Li-Peng Wang, Yang Yang, Hsiao-Hwa Chen, Yonghua S...
JCDL
2005
ACM
130views Education» more  JCDL 2005»
14 years 2 months ago
Leveraging context to resolve identity in photo albums
Our system suggests likely identity labels for photographs in a personal photo collection. Instead of using face recognition techniques, the system leverages automatically availab...
Mor Naaman, Ron B. Yeh, Hector Garcia-Molina, Andr...
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
LCTRTS
2005
Springer
14 years 2 months ago
Probabilistic source-level optimisation of embedded programs
Efficient implementation of DSP applications is critical for many embedded systems. Optimising C compilers for embedded processors largely focus on code generation and instructio...
Björn Franke, Michael F. P. O'Boyle, John Tho...