Sciweavers

15073 search results - page 2896 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
CCS
2011
ACM
14 years 1 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
MOBISYS
2009
ACM
16 years 2 months ago
Blue-Fi: enhancing Wi-Fi performance using bluetooth signals
Mobile devices are increasingly equipped with multiple network interfaces with complementary characteristics. In particular, the Wi-Fi interface has high throughput and transfer p...
Ganesh Ananthanarayanan, Ion Stoica
141
Voted
SIGIR
2012
ACM
13 years 4 months ago
Automatic suggestion of query-rewrite rules for enterprise search
Enterprise search is challenging for several reasons, notably the dynamic terminology and jargon that are specific to the enterprise domain. This challenge is partly addressed by...
Zhuowei Bao, Benny Kimelfeld, Yunyao Li
JCSS
2008
120views more  JCSS 2008»
15 years 1 months ago
Quantum certificate complexity
Given a Boolean function f, we study two natural generalizations of the certificate complexity C (f): the randomized certificate complexity RC (f) and the quantum certificate comp...
Scott Aaronson
CVPR
2009
IEEE
16 years 8 months ago
Vocabulary Hierarchy Optimization for Effective and Transferable Retrieval
Scalable image retrieval systems usually involve hierarchical quantization of local image descriptors, which produces a visual vocabulary for inverted indexing of images. Although ...
Rongrong Ji (Harbin Institute of Technology), Xing...
« Prev « First page 2896 / 3015 Last » Next »