Sciweavers

8349 search results - page 1472 / 1670
» Introduction to Information Retrieval
Sort
View
FOCS
2006
IEEE
15 years 10 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
HICSS
2006
IEEE
93views Biometrics» more  HICSS 2006»
15 years 10 months ago
Presenting the Past: A Framework for Facilitating the Externalization and Articulation of User Activities in Desktop Environment
Work processes are conducted in various contexts and they involve different tasks, interruptions, activities and actions. In all of these, tacit knowledge plays a part. Some part ...
Kimmo Wideroos, Samuli Pekkola
ICDE
2006
IEEE
192views Database» more  ICDE 2006»
15 years 10 months ago
Mining Executive Compensation Data from SEC Filings
In recent years, corporate governance has become a more and more important concern in investment decision-making. As one of the most important factors in evaluating corporate gove...
Chengmin Ding, Ping Chen
ICDE
2006
IEEE
164views Database» more  ICDE 2006»
15 years 10 months ago
Clustering Multidimensional Trajectories based on Shape and Velocity
Recently, the analysis of moving objects has become one of the most important technologies to be used in various applications such as GIS, navigation systems, and locationbased in...
Yutaka Yanagisawa, Tetsuji Satoh
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 10 months ago
On the Lower Bound of Local Optimums in K-Means Algorithm
The k-means algorithm is a popular clustering method used in many different fields of computer science, such as data mining, machine learning and information retrieval. However, ...
Zhenjie Zhang, Bing Tian Dai, Anthony K. H. Tung
« Prev « First page 1472 / 1670 Last » Next »