Sciweavers

2606 search results - page 364 / 522
» cost 2008
Sort
View
EDBT
2008
ACM
146views Database» more  EDBT 2008»
14 years 10 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
EDBT
2008
ACM
172views Database» more  EDBT 2008»
14 years 10 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
ICSE
2008
IEEE-ACM
14 years 10 months ago
MimEc: intelligent user notification of faults in the eclipse IDE
The earlier in the software process a fault is detected, the cheaper the cost of fixing the fault. Automated fault detection tools can provide developers with information througho...
Lucas Layman, Laurie A. Williams, Robert St. Amant
EWSN
2008
Springer
14 years 9 months ago
Characterizing Mote Performance: A Vector-Based Methodology
Sensors networks instrument the physical space using motes that run network embedded programs thus acquiring, processing, storing and transmitting sensor data. The motes commercial...
Martin Leopold, Marcus Chang, Philippe Bonnet
ICCD
2008
IEEE
117views Hardware» more  ICCD 2008»
14 years 7 months ago
Two dimensional highly associative level-two cache design
High associativity is important for level-two cache designs [9]. Implementing CAM-based Highly Associative Caches (CAM-HAC), however, is both costly in hardware and exhibits poor s...
Chuanjun Zhang, Bing Xue