Sciweavers

260 search results - page 40 / 52
» Industry-scale duplicate detection
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
Towards incremental adaptive covering arrays
The increasing complexity of configurable software systems creates a need for more intelligent sampling mechanisms to detect and locate failure-inducing dependencies between confi...
Adam A. Porter, Myra B. Cohen, Sandro Fouché...
GFKL
2007
Springer
148views Data Mining» more  GFKL 2007»
15 years 3 months ago
Information Integration of Partially Labeled Data
Abstract. A central task when integrating data from different sources is to detect identical items. For example, price comparison websites have to identify offers for identical p...
Steffen Rendle, Lars Schmidt-Thieme
74
Voted
MM
2009
ACM
175views Multimedia» more  MM 2009»
15 years 2 months ago
Near-duplicate video matching with transformation recognition
Nowadays, the issue of near-duplicate video matching has been extensively studied. However, transformation, which is one of the major causes of near-duplicates, has been little di...
Zhipeng Wu, Shuqiang Jiang, Qingming Huang
CN
2007
129views more  CN 2007»
14 years 9 months ago
Machine-learnt versus analytical models of TCP throughput
We first study the accuracy of two well-known analytical models of the average throughput of long-term TCP flows, namely the so-called SQRT and PFTK models, and show that these ...
Ibtissam El Khayat, Pierre Geurts, Guy Leduc
ISCI
2008
104views more  ISCI 2008»
14 years 9 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen