Sciweavers

598 search results - page 82 / 120
» Separation of Concerns and Consistent Integration in Require...
Sort
View
CIMAGING
2010
195views Hardware» more  CIMAGING 2010»
13 years 9 months ago
SPIRAL out of convexity: sparsity-regularized algorithms for photon-limited imaging
The observations in many applications consist of counts of discrete events, such as photons hitting a detector, which cannot be effectively modeled using an additive bounded or Ga...
Zachary T. Harmany, Roummel F. Marcia, Rebecca Wil...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 8 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng
IJLIT
2010
67views more  IJLIT 2010»
13 years 6 months ago
Interoperability-Centric Problems: New Challenges and Legal Solutions
Whereas abandonment of detailed regulation is widely asserted to be the true way along with the fluctuations of the business models and emergence of IP-based services, there are s...
Turgut Ayhan Beydogan
PODC
2009
ACM
14 years 4 months ago
Memory models: a case for rethinking parallel languages and hardware
The era of parallel computing for the masses is here, but writing correct parallel programs remains far more difficult than writing sequential programs. Aside from a few domains,...
Sarita V. Adve
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 1 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker