Sciweavers

249 search results - page 37 / 50
» Implicit User Modelling Using Hybrid Meta-Heuristics
Sort
View
CCGRID
2009
IEEE
14 years 2 months ago
Natively Supporting True One-Sided Communication in
As high-end computing systems continue to grow in scale, the performance that applications can achieve on such large scale systems depends heavily on their ability to avoid explic...
Gopalakrishnan Santhanaraman, Pavan Balaji, K. Gop...
KDD
2007
ACM
160views Data Mining» more  KDD 2007»
14 years 8 months ago
Show me the money!: deriving the pricing power of product features by mining consumer reviews
The increasing pervasiveness of the Internet has dramatically changed the way that consumers shop for goods. Consumergenerated product reviews have become a valuable source of inf...
Nikolay Archak, Anindya Ghose, Panagiotis G. Ipeir...
ISADS
1999
IEEE
14 years 4 hour ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
IJCV
2006
166views more  IJCV 2006»
13 years 7 months ago
Fast Constrained Surface Extraction by Minimal Paths
A new approach performing surface extraction from 3D images under user defined geometrical constraints is presented. The constraints are introduced through boundary curves given by...
Roberto Ardon, Laurent D. Cohen
CSB
2005
IEEE
118views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Gene Teams with Relaxed Proximity Constraint
Functionally related genes co-evolve, probably due to the strong selection pressure in evolution. Thus we expect that they are present in multiple genomes. Physical proximity amon...
Sun Kim, Jeong-Hyeon Choi, Jiong Yang