Sciweavers

10625 search results - page 1914 / 2125
» Supporting delay-intolerant applications
Sort
View
SIGIR
2004
ACM
15 years 4 months ago
Evaluating high accuracy retrieval techniques
Although information retrieval research has always been concerned with improving the effectiveness of search, in some applications, such as information analysis, a more specific ...
Chirag Shah, W. Bruce Croft
SIGOPSE
2004
ACM
15 years 4 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
SIGOPSE
2004
ACM
15 years 4 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
VRST
2004
ACM
15 years 4 months ago
Modeling and rendering of walkthrough environments with panoramic images
An important, potential application of image-based techniques is to create photo-realistic image-based environments for interactive walkthrough. However, existing image-based stud...
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau
WIDM
2004
ACM
15 years 4 months ago
Probabilistic models for focused web crawling
A Focused crawler must use information gleaned from previously crawled page sequences to estimate the relevance of a newly seen URL. Therefore, good performance depends on powerfu...
Hongyu Liu, Evangelos E. Milios, Jeannette Janssen
« Prev « First page 1914 / 2125 Last » Next »