Sciweavers

17680 search results - page 3450 / 3536
» Simulation of Computer Systems and Applications
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 3 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
PE
2010
Springer
102views Optimization» more  PE 2010»
15 years 3 months ago
Extracting state-based performance metrics using asynchronous iterative techniques
Solution of large sparse linear fixed-point problems lies at the heart of many important performance analysis calculations. These calculations include steady-state, transient and...
Douglas V. de Jager, Jeremy T. Bradley
MM
2010
ACM
191views Multimedia» more  MM 2010»
15 years 3 months ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
CSCW
2011
ACM
15 years 2 days ago
Your time zone or mine?: a study of globally time zone-shifted collaboration
We conducted interviews with sixteen members of teams that worked across global time zone differences. Despite time zone differences of about eight hours, collaborators still foun...
John C. Tang, Chen Zhao, Xiang Cao, Kori Inkpen
JAIR
2011
214views more  JAIR 2011»
14 years 8 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
« Prev « First page 3450 / 3536 Last » Next »