Sciweavers

1753 search results - page 348 / 351
» An Approach to Modeling Heterogeneous Resources for Informat...
Sort
View
HOTOS
1999
IEEE
14 years 25 days ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
LREC
2008
159views Education» more  LREC 2008»
13 years 10 months ago
Evaluation of Context-Dependent Phrasal Translation Lexicons for Statistical Machine Translation
We present new direct data analysis showing that dynamically-built context-dependent phrasal translation lexicons are more useful resources for phrase-based statistical machine tr...
Marine Carpuat, Dekai Wu
GIS
2010
ACM
13 years 7 months ago
Detecting nearly duplicated records in location datasets
The quality of a local search engine, such as Google and Bing Maps, heavily relies on its geographic datasets. Typically, these datasets are obtained from multiple sources, e.g., ...
Yu Zheng, Xixuan Fen, Xing Xie, Shuang Peng, James...
VIS
2004
IEEE
131views Visualization» more  VIS 2004»
14 years 9 months ago
Visualization of Intricate Flow Structures for Vortex Breakdown Analysis
Vortex breakdowns and flow recirculation are essential phenomena in aeronautics where they appear as a limiting factor in the design of modern aircrafts. Because of the inherent i...
Charles D. Hansen, Christoph Garth, Eduard Deines,...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 9 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs