Sciweavers

626 search results - page 78 / 126
» Satisfying Maintenance Goals
Sort
View
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 9 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor
ICCAD
2008
IEEE
141views Hardware» more  ICCAD 2008»
14 years 6 months ago
Layout decomposition for double patterning lithography
In double patterning lithography (DPL) layout decomposition for 45nm and below process nodes, two features must be assigned opposite colors (corresponding to different exposures)...
Andrew B. Kahng, Chul-Hong Park, Xu Xu, Hailong Ya...
WWW
2010
ACM
14 years 4 months ago
Antourage: mining distance-constrained trips from flickr
We study how to automatically extract tourist trips from large volumes of geo-tagged photographs. Working with more than 8 million of these photographs that are publicly available...
Saral Jain, Stephan Seufert, Srikanta J. Bedathur
IEEEARES
2010
IEEE
14 years 4 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
INFOCOM
2009
IEEE
14 years 3 months ago
Topology Formation for Wireless Mesh Network Planning
—Wireless mesh networks are becoming prevalent in providing access infrastructure to the public. Design of such networks involve several important goals including resilience to f...
Chun-cheng Chen, Chandra Chekuri, D. Klabjan