Sciweavers

35419 search results - page 140 / 7084
» How are we doing
Sort
View
118
Voted
CHI
2002
ACM
16 years 4 months ago
How knowledge workers use the web
We report on a diary study of how and why knowledge workers use the World Wide Web. By examining in detail a complete two-day set of Web activities from each of 24 people, we cons...
Abigail Sellen, Rachel Murphy, Kate L. Shaw
121
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Combining Multihoming with Overlay Routing (or, How to Be a Better ISP without Owning a Network)
— Multihoming and overlay routing are used, mostly separately, to bypass Internet outages, congested links and long routes. In this paper, we examine a scenario in which multihom...
Yong Zhu, Constantinos Dovrolis, Mostafa H. Ammar
FC
2005
Springer
171views Cryptology» more  FC 2005»
15 years 9 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
112
Voted
STOC
1993
ACM
87views Algorithms» more  STOC 1993»
15 years 8 months ago
How to use expert advice
We analyze algorithms that predict a binary value by combining the predictions of several prediction strategies, called experts. Our analysis is for worst-case situations, i.e., we...
Nicolò Cesa-Bianchi, Yoav Freund, David P. ...
LREC
2010
166views Education» more  LREC 2010»
15 years 5 months ago
Video Retrieval in Sign Language Videos : How to Model and Compare Signs?
This paper deals with the problem of finding sign occurrences in a sign language (SL) video. It begins with an analysis of sign models and the way they can take into account the s...
François Lefebvre-Albaret, Patrice Dalle