Sciweavers

554 search results - page 60 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
ICWE
2010
Springer
14 years 14 days ago
Ranking the Linked Data: The Case of DBpedia
The recent proliferation of crowd computing initiatives on the web calls for smarter methodologies and tools to annotate, query and explore repositories. There is the need for scal...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
CGF
2007
145views more  CGF 2007»
13 years 7 months ago
Bitmask Soft Shadows
Recently, several real-time soft shadow algorithms have been introduced which all compute a single shadow map and use its texels to obtain a discrete scene representation. The res...
Michael Schwarz, Marc Stamminger
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 9 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
ICDE
2006
IEEE
207views Database» more  ICDE 2006»
14 years 9 months ago
Automatic Sales Lead Generation from Web Data
Speed to market is critical to companies that are driven by sales in a competitive market. The earlier a potential customer can be approached in the decision making process of a p...
Ganesh Ramakrishnan, Sachindra Joshi, Sumit Negi, ...
ESWS
2008
Springer
13 years 9 months ago
Learning Highly Structured Semantic Repositories from Relational Databases:
Abstract. Relational databases are valuable sources for ontology learning. Methods and tools have been proposed to generate ontologies from such structured input. However, a major ...
Farid Cerbah