Sciweavers

6253 search results - page 1032 / 1251
» Use Case Modeling Guidelines
Sort
View
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
15 years 2 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
PVLDB
2010
117views more  PVLDB 2010»
15 years 2 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
157
Voted
TCOM
2010
167views more  TCOM 2010»
15 years 2 months ago
On distributed scheduling in wireless networks exploiting broadcast and network coding
—In this paper, we consider cross-layer optimization in wireless networks with wireless broadcast advantage, focusing on the problem of distributed scheduling of broadcast links....
Tao Cui, Lijun Chen, Tracey Ho
ACL
2010
15 years 2 months ago
Learning to Adapt to Unknown Users: Referring Expression Generation in Spoken Dialogue Systems
We present a data-driven approach to learn user-adaptive referring expression generation (REG) policies for spoken dialogue systems. Referring expressions can be difficult to unde...
Srinivasan Janarthanam, Oliver Lemon
149
Voted
SIGSOFT
2010
ACM
15 years 2 months ago
Golden implementation driven software debugging
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...
« Prev « First page 1032 / 1251 Last » Next »