Sciweavers

897 search results - page 33 / 180
» Identity: How to name it, How to find it
Sort
View
APWEB
2004
Springer
14 years 2 months ago
Semantic, Hierarchical, Online Clustering of Web Search Results
Today, search engine is the most commonly used tool for Web information retrieval, however, its current status is still far from satisfaction. This paper focuses on clustering Web...
Dell Zhang, Yisheng Dong
CVPR
2009
IEEE
1084views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Describing Objects by their Attributes
We propose to shift the goal of recognition from naming to describing. Doing so allows us not only to name familiar objects, but also: to report unusual aspects of a familiar ob...
Ali Farhadi, David A. Forsyth, Derek Hoiem, Ian En...
SAMOS
2010
Springer
13 years 7 months ago
Identifying communication models in Process Networks derived from Weakly Dynamic Programs
—Process Networks (PNs) is an appealing computation ion helping to specify an application in parallel form and realize it on parallel platforms. The key questions to be answered ...
Dmitry Nadezhkin, Todor Stefanov
P2P
2005
IEEE
106views Communications» more  P2P 2005»
14 years 2 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
MC
2008
137views Computer Science» more  MC 2008»
13 years 10 months ago
Between 'Instructions' and 'Diy': Tagging in Learning Communities
In this paper, we discuss the novel technology tagging and the results of analyzing a learning community in a popular system that relies on tagging namely YouTube. We present our ...
Milena Reichel, Heidi Schelhowe