Sciweavers

356 search results - page 70 / 72
» Model selection via the AUC
Sort
View
ANCS
2005
ACM
14 years 1 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
14 years 29 days ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu
APWEB
2010
Springer
14 years 7 days ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
IQ
2007
13 years 8 months ago
Assessing Information Quality In A RFID-Integrated Shelf Replenishment Decision Support System For The Retail Industry
: Motivated by the problem of out-of-shelf (OOS) in retail industry and the emergence of RFID (Radio Frequency Identification) technology, this paper investigates the impact that t...
Cleopatra Bardaki, Katerina Pramatari