Sciweavers

4280 search results - page 819 / 856
» Mechanisms for information elicitation
Sort
View
EDBT
2009
ACM
106views Database» more  EDBT 2009»
14 years 1 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
APNOMS
2006
Springer
14 years 1 months ago
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high...
Mourad Amad, Ahmed Meddahi
ASPLOS
2006
ACM
14 years 1 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
ATAL
2006
Springer
14 years 1 months ago
Convergence analysis for collective vocabulary development
We study how decentralized agents can develop a shared vocabulary without global coordination. Answering this question can help us understand the emergence of many communication s...
Jun Wang, Les Gasser, Jim Houk
DIAL
2004
IEEE
138views Image Analysis» more  DIAL 2004»
14 years 1 months ago
Retrieving Imaged Documents in Digital Libraries Based on Word Image Coding
A great number of documents are scanned and archived in the form of digital images in digital libraries, to make them available and accessible in the Internet. Information retriev...
Yue Lu, Li Zhang, Chew Lim Tan