Sciweavers

8795 search results - page 1526 / 1759
» Measuring Generality of Documents
Sort
View
SIGADA
2004
Springer
15 years 10 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
128
Voted
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
15 years 10 months ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz
129
Voted
MMDB
2003
ACM
94views Multimedia» more  MMDB 2003»
15 years 10 months ago
Improving image retrieval effectiveness via multiple queries
Conventional approaches to image retrieval are based on the assumption that relevant images are physically near the query image in some feature space. This is the basis of the clu...
Xiangyu Jin, James C. French
SIGIR
2003
ACM
15 years 10 months ago
Query length in interactive information retrieval
Query length in best-match information retrieval (IR) systems is well known to be positively related to effectiveness in the IR task, when measured in experimental, non-interactiv...
Nicholas J. Belkin, Diane Kelly, G. Kim, Ja-Young ...
SIGMETRICS
2003
ACM
199views Hardware» more  SIGMETRICS 2003»
15 years 10 months ago
Data cache locking for higher program predictability
Caches have become increasingly important with the widening gap between main memory and processor speeds. However, they are a source of unpredictability due to their characteristi...
Xavier Vera, Björn Lisper, Jingling Xue
« Prev « First page 1526 / 1759 Last » Next »