Sciweavers

5891 search results - page 1100 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
MA
2010
Springer
135views Communications» more  MA 2010»
15 years 3 months ago
Nonparametric comparison of regression functions
In this work we provide a new methodology for comparing regression functions m1 and m2 from two samples. Since apart from smoothness no other (parametric) assumptions are required...
Ramidha Srihera, Winfried Stute
SIGMOD
2012
ACM
253views Database» more  SIGMOD 2012»
13 years 7 months ago
Skew-aware automatic database partitioning in shared-nothing, parallel OLTP systems
The advent of affordable, shared-nothing computing systems portends a new class of parallel database management systems (DBMS) for on-line transaction processing (OLTP) applicatio...
Andrew Pavlo, Carlo Curino, Stanley B. Zdonik
172
Voted
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 7 months ago
Learning from crowds in the presence of schools of thought
Crowdsourcing has recently become popular among machine learning researchers and social scientists as an effective way to collect large-scale experimental data from distributed w...
Yuandong Tian, Jun Zhu
WWW
2008
ACM
16 years 5 months ago
Keysurf: a character controlled browser for people with physical disabilities
For many users with a physical or motor disability, using a computer mouse or other pointing device to navigate the web is cumbersome or impossible due to problems with pointing a...
Leo Spalteholz, Kin Fun Li, Nigel Livingston, Foad...
HPCA
2009
IEEE
15 years 11 months ago
Reconciling specialization and flexibility through compound circuits
While parallelism and multi-cores are receiving much attention as a major scalability path, customization is another, orthogonal and complementary, scalability path which can targ...
Sami Yehia, Sylvain Girbal, Hugues Berry, Olivier ...
« Prev « First page 1100 / 1179 Last » Next »