Sciweavers

8655 search results - page 1416 / 1731
» Challenges for Trusted Computing
Sort
View
126
Voted
CLEF
2009
Springer
15 years 1 months ago
Unsupervised Morphological Analysis by Formal Analogy
Abstract. While classical approaches to unsupervised morphology acquisition often rely on metrics based on information theory for identifying morphemes, we describe a novel approac...
Jean-François Lavallée, Philippe Lan...
GVD
2009
191views Database» more  GVD 2009»
15 years 1 months ago
Query Processing on Multi-Core Architectures
The upcoming generation of computer hardware poses several new challenges for database developers and engineers. Software in general and database management systems (DBMSs) in par...
Frank Huber, Johann Christoph Freytag
133
Voted
ICB
2009
Springer
148views Biometrics» more  ICB 2009»
15 years 1 months ago
Fuzzy 3D Face Ethnicity Categorization
In this paper, we propose a novel fuzzy 3D face ethnicity categorization algorithm, which contains two stages, learning and mapping. In learning stage, the visual codes are first l...
Cheng Zhong, Zhenan Sun, Tieniu Tan
139
Voted
ICCBR
2009
Springer
15 years 1 months ago
Toward Modeling and Teaching Legal Case-Based Adaptation with Expert Examples
Studying examples of expert case-based adaptation could advance computational modeling but only if the examples can be succinctly represented and reliably interpreted. Supreme Cour...
Kevin D. Ashley, Collin Lynch, Niels Pinkwart, Vin...
141
Voted
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
15 years 1 months ago
An Economic Model for Self-Tuned Cloud Caching
Abstract--Cloud computing, the new trend for service infrastructures requires user multi-tenancy as well as minimal capital expenditure. In a cloud that services large amounts of d...
Debabrata Dash, Verena Kantere, Anastasia Ailamaki
« Prev « First page 1416 / 1731 Last » Next »