Sciweavers

111 search results - page 3 / 23
» Comparing values and sentiment using Mechanical Turk
Sort
View
CHI
2011
ACM
12 years 11 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
EGH
2003
Springer
14 years 20 days ago
A multigrid solver for boundary value problems using programmable graphics hardware
—We present a method for using programmable graphics hardware to solve a variety of boundary value problems. The time-evolution of such problems is frequently governed by partial...
Nolan Goodnight, Cliff Woolley, Gregory Lewin, Dav...
INFOCOM
2009
IEEE
14 years 2 months ago
An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks
—State signaling and maintenance mechanisms play crucial roles in communication network protocols. State is used to facilitate indirections in protocols such as routing. Design a...
Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar ...
SIGMOD
1994
ACM
85views Database» more  SIGMOD 1994»
13 years 11 months ago
Adaptive Selectivity Estimation Using Query Feedback
In this paper, we propose a novel approach for estimating the record selectivities of database queries. The real attribute value distribution is adaptively approximated by a curve...
Chung-Min Chen, Nick Roussopoulos
LREC
2010
213views Education» more  LREC 2010»
13 years 9 months ago
Active Learning and Crowd-Sourcing for Machine Translation
In recent years, corpus based approaches to machine translation have become predominant, with Statistical Machine Translation (SMT) being the most actively progressing area. Succe...
Vamshi Ambati, Stephan Vogel, Jaime G. Carbonell