Sciweavers

24529 search results - page 4689 / 4906
» Computing on Authenticated Data
Sort
View
161
Voted
GG
2008
Springer
15 years 4 months ago
Transformation-Based Operationalization of Graph Languages
Graph Languages1 emerged during the seventies from the necessity to process data structures with complex interrelations. Nowadays, various variants of these languages can be found...
Erhard Weinell
133
Voted
CHI
2010
ACM
15 years 4 months ago
How routine learners can support family coordination
Researchers have detailed the importance of routines in how people live and work, while also cautioning system designers about the importance of people's idiosyncratic behavi...
Scott Davidoff, John Zimmerman, Anind K. Dey
139
Voted
CVPR
2010
IEEE
15 years 4 months ago
Total Bregman divergence and its applications to shape retrieval
Shape database search is ubiquitous in the world of biometric systems, CAD systems etc. Shape data in these domains is experiencing an explosive growth and usually requires search...
Meizhu Liu, Baba C. Vemuri, Shun-ichi Amari, Frank...
120
Voted
SIGCOMM
2010
ACM
15 years 4 months ago
SourceSync: a distributed wireless architecture for exploiting sender diversity
Diversity is an intrinsic property of wireless networks. Recent years have witnessed the emergence of many distributed protocols like ExOR, MORE, SOAR, SOFT, and MIXIT that exploi...
Hariharan Rahul, Haitham Hassanieh, Dina Katabi
127
Voted
AI
2010
Springer
15 years 3 months ago
Elicitation strategies for soft constraint problems with missing preferences: Properties, algorithms and experimental studies
We consider soft constraint problems where some of the preferences may be unspecified. This models, for example, settings where agents are distributed and have privacy issues, or ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
« Prev « First page 4689 / 4906 Last » Next »