Sciweavers

176 search results - page 35 / 36
» Making a Cloud Provenance-Aware
Sort
View
COMPGEOM
2008
ACM
13 years 11 months ago
Towards persistence-based reconstruction in euclidean spaces
Manifold reconstruction has been extensively studied for the last decade or so, especially in two and three dimensions. Recent advances in higher dimensions have led to new method...
Frédéric Chazal, Steve Oudot
BMCBI
2007
176views more  BMCBI 2007»
13 years 10 months ago
Correlation-maximizing surrogate gene space for visual mining of gene expression patterns in developing barley endosperm tissue
Background: Micro- and macroarray technologies help acquire thousands of gene expression patterns covering important biological processes during plant ontogeny. Particularly, fait...
Marc Strickert, Nese Sreenivasulu, Björn Usad...
IEEESP
2006
108views more  IEEESP 2006»
13 years 9 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
PAISI
2010
Springer
13 years 7 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
SECON
2010
IEEE
13 years 7 months ago
Managing TCP Connections in Dynamic Spectrum Access Based Wireless LANs
Wireless LANs have been widely deployed as edge access networks in home/office/commercial buildings, providing connection to the Internet. Therefore, performance of end-toend conne...
Ahwini Kumar, Kang G. Shin