Sciweavers

17983 search results - page 84 / 3597
» Set Types and Applications
Sort
View
IFIP
2005
Springer
15 years 8 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
LREC
2010
119views Education» more  LREC 2010»
15 years 3 months ago
Predicting Morphological Types of Chinese Bi-Character Words by Machine Learning Approaches
This paper presented an overview of Chinese bi-character words' morphological types, and proposed a set of features for machine learning approaches to predict these types bas...
Ting-Hao Huang, Lun-Wei Ku, Hsin-Hsi Chen
169
Voted
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
15 years 6 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
121
Voted
MOBISYS
2010
ACM
15 years 4 months ago
GreenGPS: a participatory sensing fuel-efficient maps application
This paper develops a navigation service, called GreenGPS, that uses participatory sensing data to map fuel consumption on city streets, allowing drivers to find the most fueleffi...
Raghu K. Ganti, Nam Pham, Hossein Ahmadi, Saurabh ...
CATE
2004
190views Education» more  CATE 2004»
15 years 3 months ago
Enhancing Online Learning Performance: An Application of Data Mining Methods
Recently web-based educational systems collect vast amounts of data on user patterns, and data mining methods can be applied to these databases to discover interesting associations...
Behrouz Minaei-Bidgoli, Gerd Kortemeyer, William F...