Sciweavers

557 search results - page 93 / 112
» Sequence Mining in Categorical Domains: Algorithms and Appli...
Sort
View
USS
2010
13 years 5 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
MSWIM
2006
ACM
14 years 1 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio
ACIVS
2005
Springer
14 years 1 months ago
A Hybrid Color-Based Foreground Object Detection Method for Automated Marine Surveillance
This paper proposes a hybrid foreground object detection method suitable for the marine surveillance applications. Our approach combines an existing foreground object detection met...
Daniel Socek, Dubravko Culibrk, Oge Marques, Hari ...
CAGD
2004
76views more  CAGD 2004»
13 years 7 months ago
Topologically consistent trimmed surface approximations based on triangular patches
Topologically consistent algorithms for the intersection and trimming of free-form parametric surfaces are of fundamental importance in computer-aided design, analysis, and manufa...
Rida T. Farouki, Chang Yong Han, Joel Hass, Thomas...
CP
2004
Springer
14 years 1 months ago
Global Constraints for Integer and Set Value Precedence
The paper introduces value precedence on integer and set sequences. A useful application of the notion is in breaking symmetries of indistinguishable values, an important class of ...
Yat Chiu Law, Jimmy Ho-Man Lee