Sciweavers

526 search results - page 88 / 106
» date 2008
Sort
View
CBSE
2008
Springer
15 years 2 months ago
Component-Level Energy Consumption Estimation for Distributed Java-Based Software Systems
Efficiency with respect to energy consumption has increasingly been recognized as an important quality attribute for distributed software systems in embedded and pervasive environm...
Chiyoung Seo, Sam Malek, Nenad Medvidovic
CHI
2008
ACM
15 years 2 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
95
Voted
CIVR
2008
Springer
114views Image Analysis» more  CIVR 2008»
15 years 2 months ago
World-scale mining of objects and events from community photo collections
In this paper, we describe an approach for mining images of objects (such as touristic sights) from community photo collections in an unsupervised fashion. Our approach relies on ...
Till Quack, Bastian Leibe, Luc J. Van Gool
CLEF
2008
Springer
15 years 2 months ago
A Comparative Study of Diversity Methods for Hybrid Text and Image Retrieval Approaches
This article compares eight different diversity methods: 3 based on visual information, 1 based on date information, 3 adapted to each topic based on location and visual informatio...
Sabrina Tollari, Philippe Mulhem, Marin Ferecatu, ...
124
Voted
CTRSA
2008
Springer
111views Cryptology» more  CTRSA 2008»
15 years 2 months ago
Efficient Fully-Simulatable Oblivious Transfer
Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant...
Andrew Y. Lindell