Sciweavers

406 search results - page 34 / 82
» The Computation and Application of the Generalized Inverse v...
Sort
View
KDD
2006
ACM
164views Data Mining» more  KDD 2006»
14 years 9 months ago
Assessing data mining results via swap randomization
The problem of assessing the significance of data mining results on high-dimensional 0?1 data sets has been studied extensively in the literature. For problems such as mining freq...
Aristides Gionis, Heikki Mannila, Panayiotis Tsapa...
TEI
2010
ACM
106views Hardware» more  TEI 2010»
14 years 3 months ago
Towards tabletop interaction with everyday artifacts via pressure imaging
Tangible user interfaces enable the interaction with digital information through the physical world. For the binding of physical representations with the underlying digital inform...
Clemens Holzmann, Andreas Hader
CASES
2010
ACM
13 years 6 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
COSIT
2011
Springer
322views GIS» more  COSIT 2011»
12 years 8 months ago
CLP(QS): A Declarative Spatial Reasoning Framework
Abstract. We propose CLP(QS), a declarative spatial reasoning framework capable of representing and reasoning about high-level, qualitative spatial knowledge about the world. We sy...
Mehul Bhatt, Jae Hee Lee, Carl Schultz
NCA
2005
IEEE
14 years 2 months ago
C-CORE: Using Communication Cores for High Performance Network Services
Recent hardware advances are creating multi-core systems with heterogeneous functionality. This paper explores how applications and middleware can utilize systems comprised of pro...
Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Sri...