Sciweavers

6978 search results - page 1265 / 1396
» Reframing Requirements Analysis
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 6 months ago
Almost Optimal Bounds for Direct Product Threshold Theorem
Abstract. We consider weakly-verifiable puzzles which are challengeresponse puzzles such that the responder may not be able to verify for itself whether it answered the challenge ...
Charanjit S. Jutla
CVPR
2010
IEEE
15 years 6 months ago
Linked Edges as Stable Region Boundaries
Many of the recently popular shape based category recognition methods require stable, connected and labeled edges as input. This paper introduces a novel method to find the most st...
Michael Donoser, Hayko Riemenschneider and Horst B...
WWW
2010
ACM
15 years 5 months ago
Money, glory and cheap talk: analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com
Crowdsourcing is a new Web phenomenon, in which a firm takes a function once performed in-house and outsources it to a crowd, usually in the form of an open contest. Designing ef...
Nikolay Archak
DASFAA
2010
IEEE
141views Database» more  DASFAA 2010»
15 years 4 months ago
Optimizing Write Performance for Read Optimized Databases
Compression in column-oriented databases has been proven to offer both performance enhancements and reductions in storage consumption. This is especially true for read access as c...
Jens Krüger, Martin Grund, Christian Tinnefel...
DASFAA
2010
IEEE
419views Database» more  DASFAA 2010»
15 years 4 months ago
Incremental Clustering for Trajectories
Trajectory clustering has played a crucial role in data analysis since it reveals underlying trends of moving objects. Due to their sequential nature, trajectory data are often rec...
Zhenhui Li, Jae-Gil Lee, Xiaolei Li, Jiawei Han
« Prev « First page 1265 / 1396 Last » Next »