Sciweavers

959 search results - page 156 / 192
» Possible and Necessary h-Indices
Sort
View
DNIS
2010
Springer
177views Database» more  DNIS 2010»
14 years 2 months ago
Managing Dynamic Mixed Workloads for Operational Business Intelligence
Abstract. As data warehousing technology gains a ubiquitous presence in business today, companies are becoming increasingly reliant upon the information contained in their data war...
Harumi A. Kuno, Umeshwar Dayal, Janet L. Wiener, K...
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
14 years 2 months ago
Rule Ensembles for Multi-target Regression
—Methods for learning decision rules are being successfully applied to many problem domains, especially where understanding and interpretation of the learned model is necessary. ...
Timo Aho, Bernard Zenko, Saso Dzeroski
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
14 years 2 months ago
Lion and man game in the presence of a circular obstacle
— In the lion and man game, a lion tries to capture a man who is as fast as the lion. We study a new version of this game which takes place in a Euclidean environment with a circ...
Nikhil Karnad, Volkan Isler
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...