Sciweavers

483 search results - page 24 / 97
» Patterns of Protocols
Sort
View
CIKM
2006
Springer
13 years 11 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
AMAI
2002
Springer
13 years 7 months ago
An Empirical Test of Patterns for Nonmonotonic Inference
: It is claimed that human inferential apparatus offers interesting ground in order to consider the intuitions of artificial intelligence researchers about the inference patterns a...
Rui Da Silva Neves, Jean-François Bonnefon,...
ISBI
2006
IEEE
14 years 8 months ago
Automated segmentation of white matter lesions in 3D brain MR images, using multivariate pattern classification
This paper presents a fully automatic white matter lesion (WML) segmentation method, based on local features determined by combining multiple MR acquisition protocols, including T...
Abbas Jawad, Bilge Karaçali, Christos Davat...
MUE
2009
IEEE
144views Multimedia» more  MUE 2009»
14 years 2 months ago
Maxtream: Stabilizing P2P Streaming by Active Prediction of Behavior Patterns
In theory, peer-to-peer (P2P) based streaming designs and simulations provide a promising alternative to serverbased streaming systems both in cost and scalability. In practice ho...
Shay Horovitz, Danny Dolev
ECOOP
2009
Springer
14 years 8 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich