Sciweavers

13224 search results - page 2610 / 2645
» Self-monitoring for Computer Users
Sort
View
IH
1998
Springer
13 years 12 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
VLDB
1998
ACM
127views Database» more  VLDB 1998»
13 years 12 months ago
Algorithms for Mining Association Rules for Binary Segmentations of Huge Categorical Databases
We consider the problem of finding association rules that make nearly optimal binary segmentations of huge categorical databases. The optimality of segmentation is defined by an o...
Yasuhiko Morimoto, Takeshi Fukuda, Hirofumi Matsuz...
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
13 years 12 months ago
VM-Based Shared Memory on Low-Latency, Remote-Memory-Access Networks
Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
STOC
1997
ACM
125views Algorithms» more  STOC 1997»
13 years 12 months ago
An Interruptible Algorithm for Perfect Sampling via Markov Chains
For a large class of examples arising in statistical physics known as attractive spin systems (e.g., the Ising model), one seeks to sample from a probability distribution π on an...
James Allen Fill
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 11 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
« Prev « First page 2610 / 2645 Last » Next »