Sciweavers

247 search results - page 46 / 50
» Requirements and Evaluation Procedures for eVoting
Sort
View
MM
2004
ACM
129views Multimedia» more  MM 2004»
15 years 2 months ago
A novel log-based relevance feedback technique in content-based image retrieval
Relevance feedback has been proposed as an important technique to boost the retrieval performance in content-based image retrieval (CBIR). However, since there exists a semantic g...
Chu-Hong Hoi, Michael R. Lyu
CIKM
2003
Springer
15 years 2 months ago
Statistical transliteration for english-arabic cross language information retrieval
Out of vocabulary (OOV) words are problematic for cross language information retrieval. One way to deal with OOV words when the two languages have different alphabets, is to trans...
Nasreen Abdul Jaleel, Leah S. Larkey
SIGECOM
2010
ACM
164views ECommerce» more  SIGECOM 2010»
15 years 2 months ago
Truthful mechanisms with implicit payment computation
It is widely believed that computing payments needed to induce truthful bidding is somehow harder than simply computing the allocation. We show that the opposite is true for singl...
Moshe Babaioff, Robert D. Kleinberg, Aleksandrs Sl...
79
Voted
EDBT
2000
ACM
15 years 1 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...
ECOOPW
1999
Springer
15 years 1 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad