Sciweavers

5450 search results - page 1058 / 1090
» Personalization of tagging systems
Sort
View
ATAL
2003
Springer
14 years 21 days ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo
ECAI
1998
Springer
14 years 20 days ago
Description Logics with Concrete Domains and Aggregation
Abstract. We extend different Description Logics by concrete domains (such as integers and reals) and by aggregation functions over these domains (such as min;max;count;sum), which...
Franz Baader, Ulrike Sattler
IDMS
1997
Springer
188views Multimedia» more  IDMS 1997»
14 years 18 days ago
An Approach for an Adaptive Visualization in a Mobile Environment
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Luc Neumann, Alberto Barbosa Raposo
ICDT
2010
ACM
147views Database» more  ICDT 2010»
14 years 11 days ago
Querying Parse Trees of Stochastic Context-Free Grammars
Stochastic context-free grammars (SCFGs) have long been recognized as useful for a large variety of tasks including natural language processing, morphological parsing, speech reco...
Sara Cohen, Benny Kimelfeld
CCS
2009
ACM
14 years 11 days ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
« Prev « First page 1058 / 1090 Last » Next »