Sciweavers

6187 search results - page 871 / 1238
» Practical Software Measurement
Sort
View
PKDD
2007
Springer
91views Data Mining» more  PKDD 2007»
15 years 11 months ago
Domain Adaptation of Conditional Probability Models Via Feature Subsetting
The goal in domain adaptation is to train a model using labeled data sampled from a domain different from the target domain on which the model will be deployed. We exploit unlabel...
Sandeepkumar Satpal, Sunita Sarawagi
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 11 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
VLDB
2007
ACM
166views Database» more  VLDB 2007»
15 years 11 months ago
To Share or Not To Share?
Intuitively, aggressive work sharing among concurrent queries in a database system should always improve performance by eliminating redundant computation or data accesses. We show...
Ryan Johnson, Nikos Hardavellas, Ippokratis Pandis...
BROADNETS
2006
IEEE
15 years 11 months ago
Snapshot: A Self-Calibration Protocol for Camera Sensor Networks
— A camera sensor network is a wireless network of cameras that are designed for ad-hoc deployment. The camera sensors in such a network need to be properly calibrated by determi...
Xiaotao Liu, Purushottam Kulkarni, Prashant J. She...
130
Voted
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 11 months ago
Can Government Be a Good eBayer? The Use of Online Auctions in the Sale of Surplus Property
E-commerce, and online auctions in particular, represent important examples of how information and communication technologies have been employed by public organizations to gain be...
Enrico Ferro, Lucy Dadayan