Sciweavers

2383 search results - page 455 / 477
» Finding Representative Set from Massive Data
Sort
View
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
IPPS
2010
IEEE
13 years 5 months ago
Performance and energy optimization of concurrent pipelined applications
In this paper, we study the problem of finding optimal mappings for several independent but concurrent workflow applications, in order to optimize performance-related criteria tog...
Anne Benoit, Paul Renaud-Goud, Yves Robert
SIGIR
2010
ACM
13 years 2 months ago
Personalised video retrieval: application of implicit feedback and semantic user profiles
TION ABSTRACT Personalised Video Retrieval: Application of Implicit Feedback and Semantic User Profiles Frank Hopfgartner University of Glasgow Glasgow G12 8QQ United Kingdom A ch...
Frank Hopfgartner
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
14 years 7 months ago
Middleware-based database replication: the gaps between theory and practice
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However...
Emmanuel Cecchet, George Candea, Anastasia Ailamak...
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...