Sciweavers

3055 search results - page 337 / 611
» Randomized Search Trees
Sort
View
SCCC
2002
IEEE
15 years 8 months ago
On the Distribution of Keys by Hashing
The distribution of keys by a hash function as used in hash search with chaining is studied by considering the distribution of keys a random function from keys to buckets would gi...
Horst H. von Brand
103
Voted
CORIA
2006
15 years 5 months ago
Unnatural language detection
In the context of web search engines, the escalation between ranking techniques and spamdexing techniques has led to the appearance of faked contents in web pages. If random sequen...
Thomas Lavergne
144
Voted
FLAIRS
1998
15 years 5 months ago
Decision Support Information Gathering System
1 The Decision Support Information Gathering System, Digs, uses influence diagrams to model user's decisions and to calculate the value of imperfect information for each avail...
Chiu-Che Tseng, Piotr J. Gmytrasiewicz
95
Voted
ENTCS
2008
120views more  ENTCS 2008»
15 years 3 months ago
Complementarity of Error Detection Techniques
We study explicit techniques for detection of safety errors, e.g., depth-first search, directed search, random walk, and bitstate hashing. We argue that it is not important to fin...
Radek Pelánek, Václav Rosecký...
124
Voted
IJCM
2007
113views more  IJCM 2007»
15 years 3 months ago
Perceptual image retrieval using eye movements
Abstract. This paper explores the feasibility of using an eye tracker as an image retrieval interface. A database of image similarity values between 1000 Corel images is used in th...
Oyewole Oyekoya, Fred Stentiford