Sciweavers

567 search results - page 106 / 114
» Collaborative recommender systems: Combining effectiveness a...
Sort
View
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 5 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
ACCV
2010
Springer
13 years 3 months ago
Randomised Manifold Forests for Principal Angle-Based Face Recognition
Abstract. In set-based face recognition, each set of face images is often represented as a linear/nonlinear manifold and the Principal Angles (PA) or Kernel PAs are exploited to me...
Ujwal D. Bonde, Tae-Kyun Kim, K. R. Ramakrishnan
ESORICS
2008
Springer
13 years 10 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
WWW
2008
ACM
14 years 9 months ago
Substructure similarity measurement in chinese recipes
Improving the precision of information retrieval has been a challenging issue on Chinese Web. As exemplified by Chinese recipes on the Web, it is not easy/natural for people to us...
Liping Wang, Qing Li, Na Li, Guozhu Dong, Yu Yang
SIGMOD
2007
ACM
225views Database» more  SIGMOD 2007»
14 years 8 months ago
From complete to incomplete information and back
Incomplete information arises naturally in numerous data management applications. Recently, several researchers have studied query processing in the context of incomplete informat...
Lyublena Antova, Christoph Koch, Dan Olteanu