Sciweavers

1042 search results - page 39 / 209
» Failing First: An Update
Sort
View
ACL
2006
14 years 11 months ago
An End-to-End Discriminative Approach to Machine Translation
We present a perceptron-style discriminative approach to machine translation in which large feature sets can be exploited. Unlike discriminative reranking approaches, our system c...
Percy Liang, Alexandre Bouchard-Côté,...
JSS
2008
97views more  JSS 2008»
14 years 10 months ago
Proactive and reactive multi-dimensional histogram maintenance for selectivity estimation
Many state-of-the-art selectivity estimation methods use query feedback to maintain histogram buckets, thereby using the limited memory efficiently. However, they are "reacti...
Zhen He, Byung Suk Lee, Xiaoyang Sean Wang
TKDE
2008
162views more  TKDE 2008»
14 years 10 months ago
Continuous k-Means Monitoring over Moving Objects
Given a dataset P, a k-means query returns k points in space (called centers), such that the average squared distance between each point in P and its nearest center is minimized. S...
Zhenjie Zhang, Yin Yang, Anthony K. H. Tung, Dimit...
PVLDB
2008
112views more  PVLDB 2008»
14 years 9 months ago
P2P logging and timestamping for reconciliation
In this paper, we address data reconciliation in peer-to-peer (P2P) collaborative applications. We propose P2P-LTR (Logging and Timestamping for Reconciliation) which provides P2P...
Mounir Tlili, William Kokou Dedzoe, Esther Pacitti...
PERCOM
2010
ACM
14 years 8 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...