Sciweavers

2738 search results - page 340 / 548
» Evaluating Discourse Processing Algorithms
Sort
View
ESORICS
2004
Springer
15 years 7 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
TEC
2008
104views more  TEC 2008»
15 years 1 months ago
Genetic-Fuzzy Data Mining With Divide-and-Conquer Strategy
Data mining is most commonly used in attempts to induce association rules from transaction data. Most previous studies focused on binary-valued transaction data. Transaction data i...
Tzung-Pei Hong, Chun-Hao Chen, Yeong-Chyi Lee, Yu-...
PODS
2007
ACM
151views Database» more  PODS 2007»
16 years 2 months ago
Optimization of continuous queries with shared expensive filters
We consider the problem of optimizing and executing multiple continuous queries, where each query is a conjunction of filters and each filter may occur in multiple queries. When f...
Kamesh Munagala, Utkarsh Srivastava, Jennifer Wido...
IISWC
2009
IEEE
15 years 8 months ago
On the (dis)similarity of transactional memory workloads
— Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternat...
Clay Hughes, James Poe, Amer Qouneh, Tao Li
115
Voted
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
15 years 8 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...