Sciweavers

773 search results - page 117 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
MOBIDE
2003
ACM
15 years 7 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
SIGIR
2003
ACM
15 years 7 months ago
Beyond independent relevance: methods and evaluation metrics for subtopic retrieval
We present a non-traditional retrieval problem we call subtopic retrieval. The subtopic retrieval problem is concerned with finding documents that cover many different subtopics ...
ChengXiang Zhai, William W. Cohen, John D. Laffert...
ADBIS
2003
Springer
127views Database» more  ADBIS 2003»
15 years 7 months ago
Using Common Schemas for Information Extraction from Heterogeneous Web Catalogs
The Web has become the world’s largest information source. Unfortunately, the main success factor of the Web, the inherent principle of distribution and autonomy of the participa...
Richard Vlach, Wassili Kazakos
SPAA
2010
ACM
15 years 6 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear
CVPR
2010
IEEE
15 years 6 months ago
Object Recognition as Ranking Holistic Figure-Ground Hypotheses
We present an approach to visual object-class recognition and segmentation based on a pipeline that combines multiple, holistic figure-ground hypotheses generated in a bottom-up,...
Fuxin Li, JoãCarreira, Cristian Sminchisescu