Sciweavers

359 search results - page 64 / 72
» Supporting Real World Security Models in Java
Sort
View
87
Voted
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 3 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
80
Voted
UAI
2000
14 years 10 months ago
Variational Relevance Vector Machines
The Support Vector Machine (SVM) of Vapnik [9] has become widely established as one of the leading approaches to pattern recognition and machine learning. It expresses predictions...
Christopher M. Bishop, Michael E. Tipping
64
Voted
OOPSLA
2005
Springer
15 years 3 months ago
Ercatons and organic programming: say good-bye to planned economy
Organic programming (OP) is our proposed and already emerging programming model which overcomes some of the limitations of current practice in software development in general and ...
Oliver Imbusch, Falk Langhammer, Guido von Walter
CIKM
2010
Springer
14 years 7 months ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
82
Voted
PE
2010
Springer
114views Optimization» more  PE 2010»
14 years 7 months ago
Analysis of scheduling policies under correlated job sizes
Correlations in traffic patterns are an important facet of the workloads faced by real systems, and one that has far-reaching consequences on the performance and optimization of t...
Varun Gupta, Michelle Burroughs, Mor Harchol-Balte...