Sciweavers

1000 search results - page 193 / 200
» Application Access Control at Network Level
Sort
View
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 1 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
LREC
2008
101views Education» more  LREC 2008»
13 years 10 months ago
The QALL-ME Benchmark: a Multilingual Resource of Annotated Spoken Requests for Question Answering
This paper presents the QALL-ME benchmark, a multilingual resource of annotated spoken requests in the tourism domain, freely available for research purposes. The languages curren...
Elena Cabrio, Milen Kouylekov, Bernardo Magnini, M...
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 8 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
CGF
2004
194views more  CGF 2004»
13 years 8 months ago
Distributed and Collaborative Visualization
Visualization is a powerful tool for analysing data and presenting results in science, engineering and medicine. This paper reviews ways in which it can be used in distributed and...
Ken Brodlie, David A. Duce, Julian R. Gallop, J. P...