Sciweavers

691 search results - page 130 / 139
» Finding Naked People
Sort
View
HASKELL
2007
ACM
14 years 23 days ago
A type-preserving closure conversion in haskell
The use of typed intermediate languages can significantly increase the reliability of a compiler. By type-checking the code produced at each transformation stage, one can identify...
Louis-Julien Guillemette, Stefan Monnier
DIS
2006
Springer
14 years 17 days ago
Visual Interactive Subgroup Discovery with Numerical Properties of Interest
Abstract. We propose an approach to subgroup discovery using distribution rules (a kind of association rules with a probability distribution on the consequent) for numerical proper...
Alípio Mário Jorge, Fernando Pereira...
INFOCOM
1991
IEEE
14 years 12 days ago
Queueing Performance with Impatient Customers
customer which exceeds its deadline will either leave the queue without service or stay in the queue to get unsucWe consider the problem of scheduling impatient CUS- cessful servic...
Zheng-Xue Zhao, Shivendra S. Panwar, Donald F. Tow...
USS
2008
13 years 11 months ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter
AIRWEB
2008
Springer
13 years 11 months ago
The anti-social tagger: detecting spam in social bookmarking systems
The annotation of web sites in social bookmarking systems has become a popular way to manage and find information on the web. The community structure of such systems attracts spam...
Beate Krause, Christoph Schmitz, Andreas Hotho, Ge...