Sciweavers

1983 search results - page 276 / 397
» Competitive graph searches
Sort
View
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
14 years 3 months ago
Exploring Two Enterprise Semantic Integration Systems
An Enterprise Semantic Integration System (ESIS) provides cross-domain and cross-department insights by normalizing and merging structured, semistructured, and unstructured data s...
Mark Ginsburg, Alex Kass, Peter Z. Yeh
CP
2009
Springer
14 years 3 months ago
Why Cumulative Decomposition Is Not as Bad as It Sounds
Abstract. The global cumulative constraint was proposed for modelling cumulative resources in scheduling problems for finite domain (FD) propagation. Since that time a great deal ...
Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, M...
GECCO
2009
Springer
151views Optimization» more  GECCO 2009»
14 years 2 months ago
Swarming to rank for information retrieval
This paper presents an approach to automatically optimize the retrieval quality of ranking functions. Taking a Swarm Intelligence perspective, we present a novel method, SwarmRank...
Ernesto Diaz-Aviles, Wolfgang Nejdl, Lars Schmidt-...
PKDD
2009
Springer
162views Data Mining» more  PKDD 2009»
14 years 2 months ago
A Convex Method for Locating Regions of Interest with Multi-instance Learning
Abstract. In content-based image retrieval (CBIR) and image screening, it is often desirable to locate the regions of interest (ROI) in the images automatically. This can be accomp...
Yu-Feng Li, James T. Kwok, Ivor W. Tsang, Zhi-Hua ...
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...