Sciweavers

4650 search results - page 772 / 930
» Generating and evaluating evaluative arguments
Sort
View
ANOR
2010
130views more  ANOR 2010»
14 years 11 months ago
Greedy scheduling with custom-made objectives
We present a methodology to automatically generate an online job scheduling method for a custom-made objective and real workloads. The scheduling problem comprises independent para...
Carsten Franke, Joachim Lepping, Uwe Schwiegelshoh...
COMSIS
2010
14 years 11 months ago
Multi-video summarization using complex graph clustering and mining
Multi-video summarization is a great theoretical and technical challenge due to the wider diversity of topics in multi-video than singlevideo as well as the multi-modality nature o...
Jian Shao, Dongming Jiang, Mengru Wang, Hong Chen,...
145
Voted
ICMLC
2010
Springer
14 years 11 months ago
Dangerous driving event prediction on expressways using fuzzy attributed map matching
: This paper presents a system for predicting dangerous driving events while driving on an expressway. There are three major tasks involved in the prediction system: (1) how to per...
Chiung-Yao Fang, Bo-Yan Wu, Jung Ming Wang, Sei-Wa...
IJMDEM
2010
72views more  IJMDEM 2010»
14 years 11 months ago
Fast Caption Alignment for Automatic Indexing of Audio
For large archives of audio media, just as with text archives, indexing is important for allowing quick and accurate searches. Similar to text archives, audio archives can use tex...
Allan Knight, Kevin C. Almeroth
125
Voted
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum