Sciweavers

980 search results - page 99 / 196
» The Architecture Tradeoff Analysis Method
Sort
View
PAKDD
2007
ACM
130views Data Mining» more  PAKDD 2007»
14 years 2 months ago
Deriving Private Information from Arbitrarily Projected Data
Distance-preserving projection based perturbation has gained much attention in privacy-preserving data mining in recent years since it mitigates the privacy/accuracy tradeoff by ac...
Songtao Guo, Xintao Wu
APGV
2008
ACM
164views Visualization» more  APGV 2008»
13 years 10 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 8 months ago
Towards Parameterized Regular Type Inference Using Set Constraints
We propose a method for inferring parameterized regular types for logic programs as solutions for systems of constraints over sets of finite ground Herbrand terms (set constraint s...
Francisco Bueno, Jorge A. Navas, Manuel V. Hermene...
JCM
2008
70views more  JCM 2008»
13 years 7 months ago
Reed-Solomon Codes for Low Power Communications
Power consumption is a critical issue for many applications running on autonomous battery operated devices. In the context of low power communications, the use of Forward Error Cor...
Lionel Biard, Dominique Noguet
STOC
1993
ACM
264views Algorithms» more  STOC 1993»
13 years 12 months ago
Contention in shared memory algorithms
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of ...
Cynthia Dwork, Maurice Herlihy, Orli Waarts