Sciweavers

9997 search results - page 1993 / 2000
» The case for crowd computing
Sort
View
CIKM
2011
Springer
13 years 9 months ago
Simultaneous joint and conditional modeling of documents tagged from two perspectives
This paper explores correspondence and mixture topic modeling of documents tagged from two different perspectives. There has been ongoing work in topic modeling of documents with...
Pradipto Das, Rohini K. Srihari, Yun Fu
CODES
2011
IEEE
13 years 9 months ago
Analysis and optimization of fault-tolerant task scheduling on multiprocessor embedded systems
Reliability is a major requirement for most safety-related systems. To meet this requirement, fault-tolerant techniques such as hardware replication and software re-execution are ...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
DEXA
2011
Springer
296views Database» more  DEXA 2011»
13 years 9 months ago
A Scalable Tag-Based Recommender System for New Users of the Social Web
Abstract. Folksonomies have become a powerful tool to describe, discover, search, and navigate online resources (e.g., pictures, videos, blogs) on the Social Web. Unlike taxonomies...
Valentina Zanardi, Licia Capra
176
Voted
HIPEAC
2011
Springer
13 years 9 months ago
Decoupled zero-compressed memory
For each computer system generation, there are always applications or workloads for which the main memory size is the major limitation. On the other hand, in many cases, one could...
Julien Dusser, André Seznec
« Prev « First page 1993 / 2000 Last » Next »