Sciweavers

139 search results - page 11 / 28
» Recovering Data Models via Guarded Dependences
Sort
View
KDD
2006
ACM
213views Data Mining» more  KDD 2006»
14 years 8 months ago
Learning sparse metrics via linear programming
Calculation of object similarity, for example through a distance function, is a common part of data mining and machine learning algorithms. This calculation is crucial for efficie...
Glenn Fung, Rómer Rosales
APSCC
2010
IEEE
13 years 5 months ago
On Evaluating and Publishing Data Concerns for Data as a Service
Abstract--The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web s...
Hong Linh Truong, Schahram Dustdar
ICCAD
2001
IEEE
113views Hardware» more  ICCAD 2001»
14 years 4 months ago
Compact Modeling and SPICE-Based Simulation for Electrothermal Analysis of Multilevel ULSI Interconnects
This paper presents both compact analytical models and fast SPICE based 3-D electro-thermal simulation methodology to characterize thermal effects due to Joule heating in high per...
TingYen Chiang, Kaustav Banerjee, Krishna Saraswat
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
TIP
2010
131views more  TIP 2010»
13 years 2 months ago
Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints
We present a new framework for data hiding in images printed with clustered dot halftones. Our application scenario, like other hardcopy embedding methods, encounters fundamental c...
Orhan Bulan, Gaurav Sharma, Vishal Monga