Sciweavers

973 search results - page 167 / 195
» Arguing Using Opponent Models
Sort
View
SPIRE
2005
Springer
15 years 3 months ago
Compressed Perfect Embedded Skip Lists for Quick Inverted-Index Lookups
Large inverted indices are by now common in the construction of web-scale search engines. For faster access, inverted indices are indexed internally so that it is possible to skip...
Paolo Boldi, Sebastiano Vigna
ICDCSW
2002
IEEE
15 years 2 months ago
Real-Time Processing of Media Streams: A Case for Event-Based Interaction
There are many challenges in devising solutions for online content processing of live networked multimedia sessions. These include the computational complexity of feature extracti...
Viktor S. Wold Eide, Frank Eliassen, Olav Lysne, O...
RECSYS
2009
ACM
15 years 2 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
CAV
2004
Springer
154views Hardware» more  CAV 2004»
15 years 1 months ago
Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values
Sequential consistency is the archetypal correctness condition for the memory protocols of shared-memory multiprocessors. Typically, such protocols are parameterized by the number ...
Jesse D. Bingham, Anne Condon, Alan J. Hu, Shaz Qa...
ECIS
2003
14 years 11 months ago
Leveraging organizational knowledge to formulate manufacturing strategy
This paper describes a web-based system that integrates knowledge management and decision-making features to enable short-term communities of practice develop manufacturing strate...
Nikos I. Karacapilidis, Emmanuel Adamides, Christi...