Sciweavers

4612 search results - page 772 / 923
» More Communications
Sort
View
FSTTCS
2003
Springer
15 years 9 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
HIPC
2003
Springer
15 years 9 months ago
Parallel and Distributed Frequent Itemset Mining on Dynamic Datasets
Traditional methods for data mining typically make the assumption that data is centralized and static. This assumption is no longer tenable. Such methods waste computational and I/...
Adriano Veloso, Matthew Eric Otey, Srinivasan Part...
HICSS
2002
IEEE
143views Biometrics» more  HICSS 2002»
15 years 9 months ago
Business Intelligence in Healthcare Organizations
The management of healthcare organizations starts to recognize the relevance of the definition of care products in relation to management information. In the turmoil between costs...
Ton A. M. Spil, Robert A. Stegwee, Christian J. A....
ICDCS
2002
IEEE
15 years 9 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
INFOCOM
2002
IEEE
15 years 9 months ago
On Multiple Description Streaming with Content Delivery Networks
Abstract— CDNs have been widely used to provide low latency, scalability, fault tolerance, and load balancing for the delivery of web content and more recently streaming media. W...
John G. Apostolopoulos, Tina Wong, Susie J. Wee, D...