Sciweavers

1816 search results - page 273 / 364
» Trace oblivious computation
Sort
View
KAIS
2011
102views more  KAIS 2011»
13 years 3 months ago
Symbolic data analysis tools for recommendation systems
Recommendation Systems have become an important tool to cope with the information overload problem by acquiring data about the user behavior. After tracing the user behavior, throu...
Byron Leite Dantas Bezerra, Francisco de Assis Ten...
TDSC
2011
13 years 3 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
DEBU
2011
13 years 9 days ago
Integrating Renewable Energy Using Data Analytics Systems: Challenges and Opportunities
The variable and intermittent nature of many renewable energy sources makes integrating them into the electric grid challenging and limits their penetration. The current grid requ...
Andrew Krioukov, Christoph Goebel, Sara Alspaugh, ...
PAM
2011
Springer
12 years 11 months ago
Evolution of Cache Replacement Policies to Track Heavy-Hitter Flows
Several important network applications cannot easily scale to higher data rates without requiring focusing just on the large traffic flows. Recent works have discussed algorithmic...
Martin Zádník, Marco Canini
ICCV
2011
IEEE
12 years 8 months ago
Segmentation from a Box
Drawing a box around an intended segmentation target has become both a popular user interface and a common output for learning-driven detection algorithms. Despite the ubiquity of...
Leo Grady, Marie-Pierre Jolly, Aaron Seitz