Sciweavers

11718 search results - page 2162 / 2344
» Testing database applications
Sort
View
ICIP
2009
IEEE
14 years 9 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
GIS
2003
ACM
14 years 9 months ago
Statistical tools for regional data analysis using GIS
A GIS provides a powerful collection of tools for the management, visualization and analysis of spatial data. These tools can be even more powerful when they are integrated with s...
Konstantin Krivoruchko, Carol A. Gotway, Alex Zhig...
WWW
2005
ACM
14 years 9 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
VLSID
2009
IEEE
177views VLSI» more  VLSID 2009»
14 years 8 months ago
Accelerating System-Level Design Tasks Using Commodity Graphics Hardware: A Case Study
Many system-level design tasks (e.g. timing analysis, hardware/software partitioning and design space exploration) involve computational kernels that are intractable (usually NP-ha...
Unmesh D. Bordoloi, Samarjit Chakraborty
KDD
2009
ACM
237views Data Mining» more  KDD 2009»
14 years 8 months ago
Exploring social tagging graph for web object classification
This paper studies web object classification problem with the novel exploration of social tags. Automatically classifying web objects into manageable semantic categories has long ...
Zhijun Yin, Rui Li, Qiaozhu Mei, Jiawei Han
« Prev « First page 2162 / 2344 Last » Next »