Sciweavers

483 search results - page 24 / 97
» Patterns of Protocols
Sort
View
147
Voted
CIKM
2006
Springer
15 years 6 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
AMAI
2002
Springer
15 years 2 months ago
An Empirical Test of Patterns for Nonmonotonic Inference
: It is claimed that human inferential apparatus offers interesting ground in order to consider the intuitions of artificial intelligence researchers about the inference patterns a...
Rui Da Silva Neves, Jean-François Bonnefon,...
116
Voted
ISBI
2006
IEEE
16 years 3 months ago
Automated segmentation of white matter lesions in 3D brain MR images, using multivariate pattern classification
This paper presents a fully automatic white matter lesion (WML) segmentation method, based on local features determined by combining multiple MR acquisition protocols, including T...
Abbas Jawad, Bilge Karaçali, Christos Davat...
118
Voted
MUE
2009
IEEE
144views Multimedia» more  MUE 2009»
15 years 9 months ago
Maxtream: Stabilizing P2P Streaming by Active Prediction of Behavior Patterns
In theory, peer-to-peer (P2P) based streaming designs and simulations provide a promising alternative to serverbased streaming systems both in cost and scalability. In practice ho...
Shay Horovitz, Danny Dolev
ECOOP
2009
Springer
16 years 3 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich