Sciweavers

10159 search results - page 1889 / 2032
» System Design Validation Using Formal Models
Sort
View
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
14 years 1 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
LREC
2010
119views Education» more  LREC 2010»
13 years 9 months ago
Error Correction for Arabic Dictionary Lookup
We describe a new Arabic spelling correction system which is intended for use with electronic dictionary search by learners of Arabic. Unlike other spelling correction systems, th...
C. Anton Rytting, Paul Rodrigues, Tim Buckwalter, ...
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
14 years 8 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
CVPR
1999
IEEE
14 years 10 months ago
Bayesian Multi-Camera Surveillance
The task of multi-camera surveillance is to reconstruct the paths taken by all moving objects that are temporarily visible from multiple non-overlapping cameras. We present a Baye...
Vera Kettnaker, Ramin Zabih
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
« Prev « First page 1889 / 2032 Last » Next »