Sciweavers

1815 search results - page 314 / 363
» Dynamic Power Management Using Data Buffers
Sort
View
DRMTICS
2005
Springer
15 years 7 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
112
Voted
CIKM
2009
Springer
15 years 6 months ago
Empirical justification of the gain and discount function for nDCG
The nDCG measure has proven to be a popular measure of retrieval effectiveness utilizing graded relevance judgments. However, a number of different instantiations of nDCG exist, d...
Evangelos Kanoulas, Javed A. Aslam
135
Voted
ICDCS
1995
IEEE
15 years 5 months ago
Parallel Processing on Networks of Workstations: A Fault-Tolerant, High Performance Approach
One of the mostsoughtaftersoftware innovation of thisdecade is the construction of systems using off-the-shelf workstations that actually deliver, and even surpass, the power and ...
Partha Dasgupta, Zvi M. Kedem, Michael O. Rabin
119
Voted
ECSCW
2007
15 years 3 months ago
Social bookmarking and exploratory search
In this paper, we explore various search tasks that are supported by a social bookmarking service. These bookmarking services hold great potential to powerfully combine personal ta...
David R. Millen, Meng Yang, Steven Whittaker, Jona...
132
Voted
ATMOS
2010
128views Optimization» more  ATMOS 2010»
15 years 1 months ago
Robust Train Routing and Online Re-scheduling
Train Routing is a problem that arises in the early phase of the passenger railway planning process, usually several months before operating the trains. The main goal is to assign...
Alberto Caprara, Laura Galli, Leo G. Kroon, G&aacu...