Sciweavers

5756 search results - page 1106 / 1152
» Describing Objects by their Attributes
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
ECAI
2000
Springer
14 years 1 months ago
Flexible Text Classification for Financial Applications: The Facile System
This paper describes an advanced system for multilingual text classification adaptable to different user needs. The system has been initially developed as an applied research proje...
Fabio Ciravegna, Alberto Lavelli, Nadia Mana, Joha...
ECCV
2000
Springer
14 years 1 months ago
Factorization with Uncertainty
Factorization using Singular Value Decomposition (SVD) is often used for recovering 3D shape and motion from feature correspondences across multiple views. SVD is powerful at find...
Michal Irani, P. Anandan
ICDE
2010
IEEE
203views Database» more  ICDE 2010»
14 years 1 months ago
Optimizing ETL workflows for fault-tolerance
Extract-Transform-Load (ETL) processes play an important role in data warehousing. Typically, design work on ETL has focused on performance as the sole metric to make sure that the...
Alkis Simitsis, Kevin Wilkinson, Umeshwar Dayal, M...
ARITH
1999
IEEE
14 years 1 months ago
Correctness Proofs Outline for Newton-Raphson Based Floating-Point Divide and Square Root Algorithms
This paper describes a study of a class of algorithms for the floating-point divide and square root operations, based on the Newton-Raphson iterative method. The two main goals we...
Marius A. Cornea-Hasegan, Roger A. Golliver, Peter...
« Prev « First page 1106 / 1152 Last » Next »