Sciweavers

4622 search results - page 898 / 925
» Foundations of Information Theory
Sort
View
CCS
2008
ACM
14 years 11 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
14 years 11 months ago
Active learning for biomedical citation screening
Active learning (AL) is an increasingly popular strategy for mitigating the amount of labeled data required to train classifiers, thereby reducing annotator effort. We describe ...
Byron C. Wallace, Kevin Small, Carla E. Brodley, T...
CHI
2008
ACM
14 years 11 months ago
Implicit user-adaptive system engagement in speech and pen interfaces
As emphasis is placed on developing mobile, educational, and other applications that minimize cognitive load on users, it is becoming more essential to base interface design on im...
Sharon L. Oviatt, Colin Swindells, Alexander M. Ar...
CANDC
2005
ACM
14 years 11 months ago
Freedom and constraint in the creative process in digital fine art: an AHRB invited workshop
The workshop will explore in depth the nature of freedom and constraint in the creative process in digital fine art from the perspective of embodied mind. The problem is crucial t...
John Haworth, Sue Gollifer, James Faure Walker, Pa...
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
14 years 11 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...