Sciweavers

1022 search results - page 179 / 205
» Stable models and circumscription
Sort
View
CIDR
2007
144views Algorithms» more  CIDR 2007»
13 years 9 months ago
Cache-Oblivious Query Processing
We propose a radical approach to relational query processing that aims at automatically and consistently achieving a good performance on any memory hierarchy. We believe this auto...
Bingsheng He, Qiong Luo
LREC
2008
111views Education» more  LREC 2008»
13 years 9 months ago
Sensitivity of Automated MT Evaluation Metrics on Higher Quality MT Output: BLEU vs Task-Based Evaluation Methods
We report the results of an experiment to assess the ability of automated MT evaluation metrics to remain sensitive to variations in MT quality as the average quality of the compa...
Bogdan Babych, Anthony Hartley
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
BILDMED
2006
112views Algorithms» more  BILDMED 2006»
13 years 9 months ago
Extracting Consistent and Manifold Interfaces from Multi-valued Volume Data Sets
We propose an algorithm to construct a set of interfaces that separate the connected components of a multi-valued volume dataset. While each single interface is a manifold triangle...
Stephan Bischoff, Leif Kobbelt
ECIS
2003
13 years 9 months ago
The transformation of work in european banks: an analysis of IT skills
Researches that have recently investigated the impact of developments in Information Technologies (IT) on human capital in the banking industry analysed only marginally the evolut...
Paolo Neirotti, Emilio Paolucci