Sciweavers

3754 search results - page 640 / 751
» Process modeling paradigms: an evaluation
Sort
View
EDBT
2012
ACM
225views Database» more  EDBT 2012»
12 years 14 days ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
TCAD
2008
167views more  TCAD 2008»
13 years 10 months ago
System-Level Dynamic Thermal Management for High-Performance Microprocessors
Abstract--Thermal issues are fast becoming major design constraints in high-performance systems. Temperature variations adversely affect system reliability and prompt worst-case de...
Amit Kumar 0002, Li Shang, Li-Shiuan Peh, Niraj K....
ISCI
2007
84views more  ISCI 2007»
13 years 10 months ago
Simulating continuous fuzzy systems
: In our book to appear in print from Springer-Verlag GmbH, Simulating Continuous Fuzzy Systems, Buckley and Jowers, we use crisp continuous simulation under Matlab™/Simulink™ ...
Leonard J. Jowers, James J. Buckley, Kevin D. Reil...
ICIP
2008
IEEE
14 years 11 months ago
Robust brain activation detection in functional MRI
Functional Magnetic Resonance Imaging (MRI) is today one of the most important non-invasive tools to study the brain from a functional point of view. The blood-oxygenation-level-d...
David M. Afonso, João M. Sanches, Martin H....
SIGSOFT
2002
ACM
14 years 10 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...