Sciweavers

285 search results - page 52 / 57
» Relating two formal models of path-vector routing
Sort
View
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
15 years 4 months ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen
WWW
2010
ACM
15 years 4 months ago
Competing for users' attention: on the interplay between organic and sponsored search results
Queries on major Web search engines produce complex result pages, primarily composed of two types of information: organic results, that is, short descriptions and links to relevan...
Cristian Danescu-Niculescu-Mizil, Andrei Z. Broder...
IROS
2009
IEEE
145views Robotics» more  IROS 2009»
15 years 4 months ago
Utilizing prior information to enhance self-supervised aerial image analysis for extracting parking lot structures
Abstract— Road network information (RNI) simplifies autonomous driving by providing strong priors about driving environments. Its usefulness has been demonstrated in the DARPA U...
Young-Woo Seo, Chris Urmson
ECSQARU
2009
Springer
15 years 4 months ago
Merging Belief Bases Represented by Logic Programs
Abstract. This paper presents a method which allows for merging beliefs expressed thanks to logic programming with stable model semantics. This method is based on the syntactic mer...
Julien Hué, Odile Papini, Eric Würbel
NSPW
2006
ACM
15 years 3 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald