Sciweavers

1192 search results - page 87 / 239
» Computing Weakest Readings
Sort
View
105
Voted
MVA
1998
117views Computer Vision» more  MVA 1998»
15 years 3 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
145
Voted
HUC
2009
Springer
15 years 1 months ago
Experiences of participatory sensing in the wild
We present two studies of participatory sensing in the wild, in which groups of young people used sensors to collect environmental data along with contextual information such as p...
Mark Paxton, Steve Benford
104
Voted
COLING
2010
14 years 10 months ago
Improving the Quality of Text Understanding by Delaying Ambiguity Resolution
Text Understanding systems often commit to a single best interpretation of a sentence before analyzing subsequent text. This interpretation is chosen by resolving ambiguous altern...
Doo Soon Kim, Ken Barker, Bruce W. Porter
146
Voted
CLUSTER
2011
IEEE
14 years 3 months ago
Incorporating Network RAM and Flash into Fast Backing Store for Clusters
—We present Nswap2L, a fast backing storage system for general purpose clusters. Nswap2L implements a single device interface on top of multiple heterogeneous physical storage de...
Tia Newhall, Douglas Woos
131
Voted
TAMC
2009
Springer
15 years 10 months ago
Best-Order Streaming Model
We study a new model of computation called stream checking on graph problems where a space-limited verifier has to verify a proof sequentially (i.e., it reads the proof as a strea...
Atish Das Sarma, Richard J. Lipton, Danupon Nanong...