Sciweavers

8655 search results - page 417 / 1731
» Challenges for Trusted Computing
Sort
View
SIGIR
2012
ACM
13 years 6 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
ICAC
2005
IEEE
15 years 9 months ago
FEEDBACKFLOW-An Adaptive Workflow Generator for Systems Management
FeedbackFlow is a framework that implements a general closed control loop of planning – execution result validation – re-planning, and generates workflows. In this article, we...
Artur Andrzejak, Ulf Hermann, Akhil Sahai
HCW
1998
IEEE
15 years 8 months ago
Steps Toward Understanding Performance in Java
Java's design goals of portability, safety, and ubiquity make it a potentially ideal language for large-scale heterogeneous computing. One of the remaining challenges is to c...
Doug Lea
158
Voted
BPM
2005
Springer
117views Business» more  BPM 2005»
15 years 9 months ago
Interoperability in Service-Based Communities
Interoperability is a multifaceted problem caused by issues surpassing those of technological incompatibilities. The real interoperability challenges are stemming from various sour...
Toni Ruokolainen, Lea Kutvonen
BMVC
2010
15 years 2 months ago
Clustered Pose and Nonlinear Appearance Models for Human Pose Estimation
We investigate the task of 2D articulated human pose estimation in unconstrained still images. This is extremely challenging because of variation in pose, anatomy, clothing, and i...
Sam Johnson, Mark Everingham