Sciweavers

1783 search results - page 250 / 357
» Provenance and Data Synchronization
Sort
View
142
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Term Weighting Approaches for Mining Significant Locations from Personal Location Logs
In this paper, we describe experiments into the application of term weighting techniques from text retrieval to support the automatic identification of significant locations from ...
Zhengwei Qiu, Cathal Gurrin, Aiden R. Doherty, Ala...
PVLDB
2010
179views more  PVLDB 2010»
15 years 2 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...
NAACL
2010
15 years 1 months ago
Predicting Human-Targeted Translation Edit Rate via Untrained Human Annotators
In the field of machine translation, automatic metrics have proven quite valuable in system development for tracking progress and measuring the impact of incremental changes. Howe...
Omar Zaidan, Chris Callison-Burch
TGC
2010
Springer
15 years 1 months ago
CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility
Car sharing and car pooling have proven to be an effective solution to reduce the amount of running vehicles by increasing the number of passengers per car amongst medium/big commu...
Vincenzo Dezani-Ciancaglini, Luigi Liquori, Lauren...
129
Voted
USS
2010
15 years 1 months ago
Adapting Software Fault Isolation to Contemporary CPU Architectures
Software Fault Isolation (SFI) is an effective approach to sandboxing binary code of questionable provenance, an interesting use case for native plugins in a Web browser. We prese...
David Sehr, Robert Muth, Cliff Biffle, Victor Khim...