Sciweavers

2144 search results - page 395 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
ASPLOS
2010
ACM
15 years 4 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
CIKM
2009
Springer
15 years 4 months ago
Semi-nonnegative matrix factorization with global statistical consistency for collaborative filtering
Collaborative Filtering, considered by many researchers as the most important technique for information filtering, has been extensively studied by both academic and industrial co...
Hao Ma, Haixuan Yang, Irwin King, Michael R. Lyu
ICAIL
2003
ACM
15 years 3 months ago
Using Ontologies for Comparing and Harmonizing Legislation
In the last decades the interest in the problem of comparing and harmonizing legislation has been steadily increasing. One reason is the increasing legal convergence between gover...
Alexander Boer, Tom M. van Engers, Radboud Winkels
ATAL
2003
Springer
15 years 3 months ago
Resource-aware exploration of the emergent dynamics of simulated systems
The emerging science of simulation enables us to explore the dynamics of large and complex systems even if a formal representation and analysis of the system is intractable and a ...
Sven Brueckner, H. Van Dyke Parunak
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi