Sciweavers

4445 search results - page 869 / 889
» Reflective Authorization Systems
Sort
View
CIDR
2007
116views Algorithms» more  CIDR 2007»
14 years 11 months ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
14 years 11 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
LREC
2008
165views Education» more  LREC 2008»
14 years 11 months ago
Design and Data Collection for Spoken Polish Dialogs Database
Spoken corpora provide a critical resource for research, development and evaluation of spoken dialog systems. This paper describes the telephone spoken dialog corpus for Polish cr...
Krzysztof Marasek, Ryszard Gubrynowicz
AVI
2004
14 years 11 months ago
Stitching: pen gestures that span multiple displays
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices with wireless networking by using pen gestures that span multiple displays. To st...
Ken Hinckley, Gonzalo Ramos, François Guimb...
AVI
2006
14 years 11 months ago
Enabling interaction with single user applications through speech and gestures on a multi-user tabletop
Co-located collaborators often work over physical tabletops with rich geospatial information. Previous research shows that people use gestures and speech as they interact with art...
Edward Tse, Chia Shen, Saul Greenberg, Clifton For...