Sciweavers

1042 search results - page 76 / 209
» Failing First: An Update
Sort
View
IJAIT
2002
82views more  IJAIT 2002»
15 years 17 days ago
Interleaved Backtracking in Distributed Constraint Networks
The adaptation of software technology to distributed environments is an important challenge today. In this work we combine parallel and distributed search. By this way we add the ...
Youssef Hamadi
107
Voted
CISC
2009
Springer
171views Cryptology» more  CISC 2009»
14 years 10 months ago
Sanitizable Signatures with Strong Transparency in the Standard Model
Sanitizable signatures provide several security features which are useful in many scenarios including military and medical applications. Sanitizable signatures allow a semi-trusted...
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. P...
104
Voted
ERCIMDL
2009
Springer
126views Education» more  ERCIMDL 2009»
14 years 10 months ago
Developing a Digital Libraries Master's Programme
Abstract. The changes in Swedish education following the Bologna requirements resulted in the first Master's programmes in Library and Information Science. Two of them target ...
Elena Maceviciute, Thomas D. Wilson, Helena Franck...
120
Voted
ICIP
2009
IEEE
14 years 10 months ago
Expanded bag of words representation for object classification
Currently, the bag of visual words (BOW) representation has received wide applications in object categorization. However, the BOW representation ignores the dependency relationshi...
Tinglin Liu, Jing Liu, Qingshan Liu, Hanqing Lu
99
Voted
ICMLA
2009
14 years 10 months ago
Text Classification Methodologies Applied to Micro-Text in Military Chat
We propose methods to classify lines of military chat, or posts, which contain items of interest. We evaluated several current text categorization and feature selection methodologi...
Kevin Dela Rosa, Jeffrey Ellen