Sciweavers

551 search results - page 14 / 111
» The Complexity of Andersen's Analysis in Practice
Sort
View
CSSE
2006
IEEE
13 years 6 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
AEI
2002
70views more  AEI 2002»
13 years 6 months ago
A performance-based approach to wheelchair accessible route analysis
This paper presents a method to determine if a usable wheelchair accessible route in a facility exists using motion-planning techniques. We use a `performance-based' approach...
Charles S. Han, Kincho H. Law, Jean-Claude Latombe...
WWW
2008
ACM
14 years 7 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
SAINT
2005
IEEE
14 years 9 days ago
A Framework of Numerical Basket Analysis
Basket Analysis is mathematically characterized and extended to search families of sets in this paper. These theories indicate the possibility of various new approaches of data mi...
Takashi Washio, Atsushi Fujimoto, Hiroshi Motoda
ICCAD
1994
IEEE
139views Hardware» more  ICCAD 1994»
13 years 11 months ago
Switching activity analysis considering spatiotemporal correlations
This work presents techniques for computing the switching activities of all circuit nodes under pseudorandom or biased input sequences and assuming a zero delay mode of operation....
Radu Marculescu, Diana Marculescu, Massoud Pedram