Sciweavers

3971 search results - page 737 / 795
» On the Use of Properties in Java Applications
Sort
View
148
Voted
WWW
2011
ACM
14 years 11 months ago
Finding the bias and prestige of nodes in networks based on trust scores
Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...
Abhinav Mishra, Arnab Bhattacharya
BMCBI
2011
14 years 11 months ago
Phenotype Recognition with Combined Features and Random Subspace Classifier Ensemble
Background: Automated, image based high-content screening is a fundamental tool for discovery in biological science. Modern robotic fluorescence microscopes are able to capture th...
Bailing Zhang, Tuan D. Pham
POPL
2012
ACM
13 years 12 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
EDBT
2012
ACM
291views Database» more  EDBT 2012»
13 years 6 months ago
Relevance search in heterogeneous networks
Conventional research on similarity search focuses on measuring the similarity between objects with the same type. However, in many real-world applications, we need to measure the...
Chuan Shi, Xiangnan Kong, Philip S. Yu, Sihong Xie...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 9 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer