Sciweavers

29143 search results - page 5652 / 5829
» A Sortation System Model
Sort
View
AAAI
2010
15 years 4 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
BIS
2007
173views Business» more  BIS 2007»
15 years 4 months ago
Natural Language Technology for Information Integration in Business Intelligence
Business intelligence requires the collecting and merging of information from many different sources, both structured and unstructured, in order to analyse for example financial ...
Diana Maynard, Horacio Saggion, Milena Yankova, Ka...
CAINE
2007
15 years 4 months ago
A Novel Peak Detection Algorithm for Use in the Study of Machining Chip Segmentation
The study of how metal deforms and flows as parts are machined yields important insights into the metal cutting process. Improvements in high-speed digital imaging and image proce...
Eric Whitenton, Robert Ivester, Jarred Heigel
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 4 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
COLING
2008
15 years 4 months ago
Choosing the Right Translation: A Syntactically Informed Classification Approach
One style of Multi-Engine Machine Translation architecture involves choosing the best of a set of outputs from different systems. Choosing the best translation from an arbitrary s...
Simon Zwarts, Mark Dras
« Prev « First page 5652 / 5829 Last » Next »