Sciweavers

6885 search results - page 1320 / 1377
» The micro-structure of use of help
Sort
View
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 3 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
KDD
2005
ACM
147views Data Mining» more  KDD 2005»
14 years 3 months ago
Combining proactive and reactive predictions for data streams
Mining data streams is important in both science and commerce. Two major challenges are (1) the data may grow without limit so that it is difficult to retain a long history; and (...
Ying Yang, Xindong Wu, Xingquan Zhu
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 3 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
ACMDIS
2004
ACM
14 years 3 months ago
The calder toolkit: wired and wireless components for rapidly prototyping interactive devices
Toolkits and other tools have dramatically reduced the time and technical expertise needed to design and implement graphical user interfaces (GUIs) allowing high-quality, iterativ...
Johnny C. Lee, Daniel Avrahami, Scott E. Hudson, J...
ISPD
2004
ACM
189views Hardware» more  ISPD 2004»
14 years 3 months ago
Almost optimum placement legalization by minimum cost flow and dynamic programming
VLSI placement tools usually work in two steps: First, the cells that have to be placed are roughly spread out over the chip area ignoring disjointness (global placement). Then, i...
Ulrich Brenner, Anna Pauli, Jens Vygen
« Prev « First page 1320 / 1377 Last » Next »