Sciweavers

8795 search results - page 1729 / 1759
» Managing scientific data
Sort
View
CCS
2008
ACM
14 years 6 hour ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
ISCA
2010
IEEE
222views Hardware» more  ISCA 2010»
14 years 6 hour ago
Cohesion: a hybrid memory model for accelerators
Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to mana...
John H. Kelm, Daniel R. Johnson, William Tuohy, St...
CIKM
2008
Springer
14 years 1 hour ago
Non-local evidence for expert finding
The task addressed in this paper, finding experts in an enterprise setting, has gained in importance and interest over the past few years. Commonly, this task is approached as an ...
Krisztian Balog, Maarten de Rijke
CIKM
2008
Springer
14 years 1 hour ago
Active relevance feedback for difficult queries
Relevance feedback has been demonstrated to be an effective strategy for improving retrieval accuracy. The existing relevance feedback algorithms based on language models and vect...
Zuobing Xu, Ram Akella
CIKM
2008
Springer
14 years 52 min ago
Modeling LSH for performance tuning
Although Locality-Sensitive Hashing (LSH) is a promising approach to similarity search in high-dimensional spaces, it has not been considered practical partly because its search q...
Wei Dong, Zhe Wang, William Josephson, Moses Chari...
« Prev « First page 1729 / 1759 Last » Next »