Sciweavers

12714 search results - page 2423 / 2543
» Designing Data Warehouses
Sort
View
SIGIR
2006
ACM
14 years 4 months ago
A statistical method for system evaluation using incomplete judgments
We consider the problem of large-scale retrieval evaluation, and we propose a statistical method for evaluating retrieval systems using incomplete judgments. Unlike existing techn...
Javed A. Aslam, Virgiliu Pavlu, Emine Yilmaz
SIGUCCS
2006
ACM
14 years 4 months ago
Automated podcasting solution expands the boundaries of the classroom
A scalable podcast solution developed at the University of Washington makes the podcasting of class lectures easy for faculty by automating the capture, uploading, and delivery of...
David Aldrich, Bradley Bell, Tim Batzel
WPES
2006
ACM
14 years 4 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
CVPR
2010
IEEE
14 years 3 months ago
Semantic Context Modeling with Maximal Margin Conditional Random Fields for Automatic Image Annotation
Context modeling for Vision Recognition and Automatic Image Annotation (AIA) has attracted increasing attentions in recent years. For various contextual information and resources,...
Yu Xiang, Xiangdong Zhou, Zuotao Liu, Tat-seng chu...
ACSAC
2005
IEEE
14 years 3 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
« Prev « First page 2423 / 2543 Last » Next »