Sciweavers

5246 search results - page 1002 / 1050
» Sanitization models and their limitations
Sort
View
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
14 years 2 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
ICA3PP
2010
Springer
14 years 2 months ago
Modular Resultant Algorithm for Graphics Processors
Abstract. In this paper we report on the recent progress in computing bivariate polynomial resultants on Graphics Processing Units (GPU). Given two polynomials in Z[x, y], our algo...
Pavel Emeliyanenko
CCS
2009
ACM
14 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
COSIT
2001
Springer
139views GIS» more  COSIT 2001»
14 years 2 months ago
Two Path Prepositions: Along and Past
Abstract. We present results from a series of experiments, where relevant factors for the use of path prepositions were examined. We were especially interested in the concepts behi...
Christian Kray, Jörg Baus, Hubert D. Zimmer, ...
MASA
2001
Springer
14 years 2 months ago
Distributed Shared Agent Representations
Abstract 1 Different definitions of agents use concepts such as autonomy, pro-activity, reactivity, social abilities, and intentional models. Very few (if any), however, refer to...
Frances M. T. Brazier, Maarten van Steen, Niek J. ...
« Prev « First page 1002 / 1050 Last » Next »