Sciweavers

8486 search results - page 1623 / 1698
» Ordered Enumeration Method
Sort
View
EDBT
2009
ACM
156views Database» more  EDBT 2009»
15 years 7 months ago
Evaluating very large datalog queries on social networks
We consider a near future scenario in which users of a Web 2.0 application, such as a social network, contribute to the application not only data, but also rules which automatical...
Royi Ronen, Oded Shmueli
132
Voted
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
15 years 7 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng
118
Voted
LPNMR
2009
Springer
15 years 7 months ago
Manifold Answer-Set Programs for Meta-reasoning
Abstract. In answer-set programming (ASP), the main focus usually is on computing answer sets which correspond to solutions to the problem represented by a logic program. Simple re...
Wolfgang Faber, Stefan Woltran
246
Voted
MHCI
2009
Springer
15 years 7 months ago
pieTouch: a direct touch gesture interface for interacting with in-vehicle information systems
Touch-sensitive displays seem like a natural and promising option for dealing with the increasing complexity of current in-vehicle information systems (IVIS), but since they can h...
Ronald Ecker, Verena Broy, Andreas Butz, Alexander...
130
Voted
ASIACRYPT
2001
Springer
15 years 7 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
« Prev « First page 1623 / 1698 Last » Next »