Sciweavers

26354 search results - page 46 / 5271
» How we refactor, and how we know it
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Combining Multihoming with Overlay Routing (or, How to Be a Better ISP without Owning a Network)
— Multihoming and overlay routing are used, mostly separately, to bypass Internet outages, congested links and long routes. In this paper, we examine a scenario in which multihom...
Yong Zhu, Constantinos Dovrolis, Mostafa H. Ammar
FC
2005
Springer
171views Cryptology» more  FC 2005»
14 years 1 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
STOC
1993
ACM
87views Algorithms» more  STOC 1993»
13 years 12 months ago
How to use expert advice
We analyze algorithms that predict a binary value by combining the predictions of several prediction strategies, called experts. Our analysis is for worst-case situations, i.e., we...
Nicolò Cesa-Bianchi, Yoav Freund, David P. ...
LREC
2010
166views Education» more  LREC 2010»
13 years 9 months ago
Video Retrieval in Sign Language Videos : How to Model and Compare Signs?
This paper deals with the problem of finding sign occurrences in a sign language (SL) video. It begins with an analysis of sign models and the way they can take into account the s...
François Lefebvre-Albaret, Patrice Dalle
PVLDB
2008
126views more  PVLDB 2008»
13 years 7 months ago
Dwarfs in the rearview mirror: how big are they really?
Online-Analytical Processing (OLAP) has been a field of competing technologies for the past ten years. One of the still unsolved challenges of OLAP is how to provide quick respons...
Jens Dittrich, Lukas Blunschi, Marcos Antonio Vaz ...