Sciweavers

4491 search results - page 378 / 899
» Algorithm Engineering
Sort
View
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
Adapting to the Shifting Intent of Search Queries
Search engines today present results that are often oblivious to recent shifts in intent. For example, the meaning of the query `independence day' shifts in early July to a U...
Umar Syed, Aleksandrs Slivkins, Nina Mishra
CSSE
2006
IEEE
15 years 4 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
TASE
2008
IEEE
15 years 4 months ago
Automated Planning and Optimization of Lumber Production Using Machine Vision and Computed Tomography
An automated system for planning and optimization of lumber production using Machine Vision and Computed Tomography (CT) is proposed. Cross-sectional CT images of hardwood logs are...
Suchendra M. Bhandarkar, Xingzhi Luo, Richard F. D...
CAD
2005
Springer
15 years 4 months ago
Computer-aided characterization for effective mechanical properties of porous tissue scaffolds
Performance of various functions of the tissue structure depends on porous scaffold microstructures with specific porosity characteristics that influence the behavior of the incor...
Zhibin Fang, Binil Starly, Wei Sun
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li