Sciweavers

6906 search results - page 1137 / 1382
» An algorithm for modelling key terms
Sort
View
PPOPP
2010
ACM
16 years 2 months ago
GAMBIT: effective unit testing for concurrency libraries
As concurrent programming becomes prevalent, software providers are investing in concurrency libraries to improve programmer productivity. Concurrency libraries improve productivi...
Katherine E. Coons, Sebastian Burckhardt, Madanlal...
KDD
2004
ACM
285views Data Mining» more  KDD 2004»
15 years 10 months ago
Effective localized regression for damage detection in large complex mechanical structures
In this paper, we propose a novel data mining technique for the efficient damage detection within the large-scale complex mechanical structures. Every mechanical structure is defi...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
WPES
2003
ACM
15 years 10 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
151
Voted
CIKM
2008
Springer
15 years 6 months ago
Non-local evidence for expert finding
The task addressed in this paper, finding experts in an enterprise setting, has gained in importance and interest over the past few years. Commonly, this task is approached as an ...
Krisztian Balog, Maarten de Rijke
IPMI
2005
Springer
16 years 5 months ago
Regional Whole Body Fat Quantification in Mice
Obesity has risen to epidemic levels in the United States and around the world. Global indices of obesity such as the body mass index (BMI) have been known to be inaccurate predict...
Xenophon Papademetris, Pavel Shkarin, Lawrence H. ...
« Prev « First page 1137 / 1382 Last » Next »