Sciweavers

1531 search results - page 284 / 307
» Identifying Topics by Position
Sort
View
ASPLOS
2008
ACM
13 years 9 months ago
General and efficient locking without blocking
Standard concurrency control mechanisms offer a trade-off: Transactional memory approaches maximize concurrency, but suffer high overheads and cost for retrying in the case of act...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
CIKM
2008
Springer
13 years 9 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
CIVR
2008
Springer
125views Image Analysis» more  CIVR 2008»
13 years 9 months ago
(Un)Reliability of video concept detection
Great effort has been made to improve video concept detection and continuous progress has been reported. With the current evaluation method being confined to carefully annotated d...
Jun Yang 0003, Alexander G. Hauptmann
APPROX
2010
Springer
207views Algorithms» more  APPROX 2010»
13 years 9 months ago
Exploiting Concavity in Bimatrix Games: New Polynomially Tractable Subclasses
Abstract. We study the fundamental problem of computing an arbitrary Nash equilibrium in bimatrix games. We start by proposing a novel characterization of the set of Nash equilibri...
Spyros C. Kontogiannis, Paul G. Spirakis
AGI
2008
13 years 9 months ago
The Basic AI Drives
One might imagine that AI systems with harmless goals will be harmless. This paper instead shows that intelligent systems will need to be carefully designed to prevent them from be...
Stephen M. Omohundro