Sciweavers

12373 search results - page 2290 / 2475
» Semi-Logarithmic Number Systems
Sort
View
91
Voted
CIKM
2006
Springer
15 years 7 months ago
Optimisation methods for ranking functions with multiple parameters
Optimising the parameters of ranking functions with respect to standard IR rank-dependent cost functions has eluded satisfactory analytical treatment. We build on recent advances ...
Michael J. Taylor, Hugo Zaragoza, Nick Craswell, S...
156
Voted
CIKM
2006
Springer
15 years 7 months ago
Constrained subspace skyline computation
In this paper we introduce the problem of Constrained Subspace Skyline Queries. This class of queries can be thought of as a generalization of subspace skyline queries using range...
Evangelos Dellis, Akrivi Vlachou, Ilya Vladimirski...
170
Voted
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
15 years 7 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
134
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
Predicting Real-Time Properties of Component Assemblies: A Scenario-Simulation Approach
This paper addresses the problem of predicting timing properties of multi-tasking component assemblies during the design phase. For real-time applications, it is of vital importan...
Egor Bondarev, Johan Muskens, Peter H. N. de With,...
128
Voted
CLEF
2006
Springer
15 years 7 months ago
Overview of the CLEF 2006 Multilingual Question Answering Track
Having being proposed for the fourth time, the QA at CLEF track has confirmed a still raising interest from the research community, recording a constant increase both in the numbe...
Bernardo Magnini, Danilo Giampiccolo, Pamela Forne...
« Prev « First page 2290 / 2475 Last » Next »