Sciweavers

1329 search results - page 252 / 266
» Phantom faces for face analysis
Sort
View
ICS
2005
Tsinghua U.
14 years 2 months ago
A performance-conserving approach for reducing peak power consumption in server systems
The combination of increasing component power consumption, a desire for denser systems, and the required performance growth in the face of technology-scaling issues are posing eno...
Wesley M. Felter, Karthick Rajamani, Tom W. Keller...
VLDB
2005
ACM
136views Database» more  VLDB 2005»
14 years 2 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
ASSETS
2004
ACM
14 years 2 months ago
Semantic bookmarking for non-visual web access
Bookmarks are shortcuts that enable quick access of the desired Web content. They have become a standard feature in any browser and recent studies have shown that they can be very...
Saikat Mukherjee, I. V. Ramakrishnan, Michael Kife...
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 2 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 2 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu