Sciweavers

12264 search results - page 2350 / 2453
» Analysis of the rubberband algorithm
Sort
View
131
Voted
HICSS
2010
IEEE
193views Biometrics» more  HICSS 2010»
15 years 10 months ago
The Topological and Electrical Structure of Power Grids
Numerous recent papers have found important relationships between network structure and risks within networks. These results indicate that network structure can dramatically affec...
Paul Hines, Seth Blumsack, E. Cotilla Sanchez, C. ...
MIR
2010
ACM
167views Multimedia» more  MIR 2010»
15 years 10 months ago
Improving automatic music classification performance by extracting features from different types of data
This paper discusses two sets of automatic musical genre classification experiments. Promising research directions are then proposed based on the results of these experiments. The...
Cory McKay, Ichiro Fujinaga
POPL
2010
ACM
15 years 10 months ago
Compress-and-conquer for optimal multicore computing
We propose a programming paradigm called compress-and-conquer (CC) that leads to optimal performance on multicore platforms. Given a multicore system of p cores and a problem of s...
Zhijing G. Mou, Hai Liu, Paul Hudak
118
Voted
WSDM
2010
ACM
197views Data Mining» more  WSDM 2010»
15 years 10 months ago
Beyond DCG: user behavior as a predictor of a successful search
Web search engines are traditionally evaluated in terms of the relevance of web pages to individual queries. However, relevance of web pages does not tell the complete picture, si...
Ahmed Hassan, Rosie Jones, Kristina Lisa Klinkner
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 10 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
« Prev « First page 2350 / 2453 Last » Next »