Sciweavers

2310 search results - page 426 / 462
» Managing System and Active-Content Integrity
Sort
View
ESTIMEDIA
2009
Springer
13 years 5 months ago
Optimal stack frame placement and transfer for energy reduction targeting embedded processors with scratch-pad memories
Abstract--Memory accesses are a major cause of energy consumption for embedded systems and the stack is a frequent target for data accesses. This paper presents a fully software te...
Lovic Gauthier, Tohru Ishihara
KDD
2003
ACM
233views Data Mining» more  KDD 2003»
14 years 8 months ago
SEWeP: using site semantics and a taxonomy to enhance the Web personalization process
Web personalization is the process of customizing a Web site to the needs of each specific user or set of users, taking advantage of the knowledge acquired through the analysis of...
Magdalini Eirinaki, Michalis Vazirgiannis, Iraklis...
SIGMOD
2006
ACM
161views Database» more  SIGMOD 2006»
14 years 7 months ago
Paper-based mobile access to databases
Our demonstration is a paper-based interactive guide for visitors to the world's largest international arts festival that was developed as part of a project investigating new...
Beat Signer, Moira C. Norrie, Michael Grossniklaus...
ESORICS
2009
Springer
14 years 2 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
AIME
2009
Springer
14 years 2 months ago
Mining Healthcare Data with Temporal Association Rules: Improvements and Assessment for a Practical Use
Abstract. The Regional Healthcare Agency (ASL) of Pavia has been maintaining a central data repository which stores healthcare data about the population of Pavia area. The analysis...
Stefano Concaro, Lucia Sacchi, Carlo Cerra, Pietro...