Sciweavers

3091 search results - page 269 / 619
» The Color Between Two Others
Sort
View
JLP
2011
106views more  JLP 2011»
14 years 7 months ago
Concurrent Kleene Algebra and its Foundations
A Concurrent Kleene Algebra offers two composition operators, related by a weak version of an exchange law: when applied in a trace model of program semantics, one of them stands...
Tony Hoare, Bernhard Möller, Georg Struth, Ia...
MKTSCI
2011
354views Multimedia» more  MKTSCI 2011»
14 years 7 months ago
Online Display Advertising: Targeting and Obtrusiveness
We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing a...
Avi Goldfarb, Catherine Tucker
NAR
2011
252views Computer Vision» more  NAR 2011»
14 years 7 months ago
BISC: Binary SubComplexes in proteins database
Binary subcomplexes in proteins database (BISC) is a new protein–protein interaction (PPI) database linking up the two communities most active in their characterization: structu...
Thomas Juettemann, Dietlind L. Gerloff
SIGIR
2012
ACM
13 years 6 months ago
Effect of written instructions on assessor agreement
Assessors frequently disagree on the topical relevance of documents. How much of this disagreement is due to ambiguity in assessment instructions? We have two assessors assess TRE...
William Webber, Bryan Toth, Marjorie Desamito
137
Voted
ICIP
2009
IEEE
16 years 5 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...