Sciweavers

555 search results - page 93 / 111
» Performance Evaluation of Two Data Mining Techniques of Netw...
Sort
View
ICDCS
2010
IEEE
13 years 5 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CIKM
2008
Springer
13 years 9 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
14 years 9 days ago
Grouped graphical Granger modeling methods for temporal causal modeling
We develop and evaluate an approach to causal modeling based on time series data, collectively referred to as“grouped graphical Granger modeling methods.” Graphical Granger mo...
Aurelie C. Lozano, Naoki Abe, Yan Liu, Saharon Ros...
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Eye Gaze Studies Comparing Head-Up and Head-Down Displays in Vehicles
To minimize the mental workload for the driver and to keep the increasing amount of information easily accessible, sophisticated display and interaction techniques are essential. ...
Markus Ablaßmeier, Tony Poitschke, Frank Wal...
MSWIM
2003
ACM
14 years 29 days ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...