Sciweavers

18204 search results - page 3613 / 3641
» Distributed Video Presentations
Sort
View
146
Voted
CASES
2010
ACM
15 years 11 days ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
CIKM
2010
Springer
15 years 10 days ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
EMNLP
2010
15 years 10 days ago
A New Approach to Lexical Disambiguation of Arabic Text
We describe a model for the lexical analysis of Arabic text, using the lists of alternatives supplied by a broad-coverage morphological analyzer, SAMA, which include stable lemma ...
Rushin Shah, Paramveer S. Dhillon, Mark Liberman, ...
GIS
2010
ACM
15 years 10 days ago
Querying geo-social data by bridging spatial networks and social networks
Recording the location of people using location-acquisition technologies, such as GPS, allows generating life patterns, which associate people to places they frequently visit. Con...
Yerach Doytsher, Ben Galon, Yaron Kanza
202
Voted
IC
2010
15 years 9 days ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya
« Prev « First page 3613 / 3641 Last » Next »