Sciweavers

1244 search results - page 240 / 249
» Searching in Higher Dimension
Sort
View
ATAL
2004
Springer
14 years 2 months ago
Strategic Deception in Agents
CHRISTIAN, DAVID B. Strategic Deception in Agents. (Under the direction of Assistant Professor R. Michael Young). Despite its negative ethical connotations, deception is a useful ...
David B. Christian, R. Michael Young
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 1 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
MICRO
2003
IEEE
128views Hardware» more  MICRO 2003»
14 years 1 months ago
IPStash: a Power-Efficient Memory Architecture for IP-lookup
Abstract—High-speed routers often use commodity, fully-associative, TCAMs (Ternary Content Addressable Memories) to perform packet classification and routing (IP lookup). We prop...
Stefanos Kaxiras, Georgios Keramidas
RECSYS
2009
ACM
14 years 1 months ago
iTag: a personalized blog tagger
We present iTag, a personalized tag recommendation system for blogs. iTag improves on the state-of-the-art in tag recommendation systems in two ways. First, iTag has much higher p...
Michael Hart, Rob Johnson, Amanda Stent
WWW
2009
ACM
14 years 1 months ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...