Sciweavers

392 search results - page 56 / 79
» Integrating Constraints in an Object-Based Knowledge Represe...
Sort
View
ICDM
2009
IEEE
117views Data Mining» more  ICDM 2009»
14 years 3 months ago
Redistricting Using Heuristic-Based Polygonal Clustering
— Redistricting is the process of dividing a geographic area into districts or zones. This process has been considered in the past as a problem that is computationally too comple...
Deepti Joshi, Leen-Kiat Soh, Ashok Samal
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 3 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
CADE
2011
Springer
12 years 9 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 11 months ago
Differentially private transit data publication: a case study on the montreal transportation system
With the wide deployment of smart card automated fare collection (SCAFC) systems, public transit agencies have been benefiting from huge volume of transit data, a kind of sequent...
Rui Chen, Benjamin C. M. Fung, Bipin C. Desai, N&e...
BMCBI
2008
122views more  BMCBI 2008»
13 years 9 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...