Sciweavers

1993 search results - page 203 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
145
Voted
CCS
2010
ACM
15 years 11 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 11 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
143
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Impact of Social Networks on Delay Tolerant Routing
Abstract—Delay Tolerant Networks (DTNs) are wireless networks in which at any given time instance, the probability of having a complete path from a source to destination is low d...
Eyuphan Bulut, Zijian Wang, Boleslaw K. Szymanski
DATE
2008
IEEE
116views Hardware» more  DATE 2008»
15 years 11 months ago
A Variation Aware High Level Synthesis Framework
— The worst-case delay/power of function units has been used in traditional high level synthesis to facilitate design space exploration. As technology scales to nanometer regime,...
Feng Wang 0004, Guangyu Sun, Yuan Xie
SMI
2007
IEEE
157views Image Analysis» more  SMI 2007»
15 years 10 months ago
Skeleton-based Hierarchical Shape Segmentation
We present an effective framework for segmenting 3D shapes into meaningful components using the curve skeleton. Our algorithm identifies a number of a critical points on the curv...
Dennie Reniers, Alexandru Telea