Sciweavers

634 search results - page 119 / 127
» On the history of evaluation in IR
Sort
View
ICPP
2003
IEEE
14 years 25 days ago
A Hardware-based Cache Pollution Filtering Mechanism for Aggressive Prefetches
Aggressive hardware-based and software-based prefetch algorithms for hiding memory access latencies were proposed to bridge the gap of the expanding speed disparity between proces...
Xiaotong Zhuang, Hsien-Hsin S. Lee
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 24 days ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 23 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ICMI
2003
Springer
143views Biometrics» more  ICMI 2003»
14 years 23 days ago
Mutual disambiguation of 3D multimodal interaction in augmented and virtual reality
We describe an approach to 3D multimodal interaction in immersive augmented and virtual reality environments that accounts for the uncertain nature of the information sources. The...
Edward C. Kaiser, Alex Olwal, David McGee, Hrvoje ...
HICSS
2002
IEEE
140views Biometrics» more  HICSS 2002»
14 years 15 days ago
Intelligent Student Profiling with Fuzzy Models
Traditional Web-based educational systems still have several shortcomings when comparing with a real-life classroom teaching, such as lack of contextual and adaptive support, lack...
Dongming Xu, Huaiqing Wang, Kaile Su