Sciweavers

811 search results - page 102 / 163
» When Novelty Is Not Enough
Sort
View
ECRTS
2010
IEEE
13 years 9 months ago
Preemption Points Placement for Sporadic Task Sets
Abstract--Limited preemption scheduling has been introduced as a viable alternative to non-preemptive and fullypreemptive scheduling when reduced blocking times need to coexist wit...
Marko Bertogna, Giorgio C. Buttazzo, Mauro Marinon...
ESORICS
2010
Springer
13 years 9 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
DASFAA
2008
IEEE
149views Database» more  DASFAA 2008»
13 years 9 months ago
A Test Paradigm for Detecting Changes in Transactional Data Streams
A pattern is considered useful if it can be used to help a person to achieve his goal. Mining data streams for useful patterns is important in many applications. However, data stre...
Willie Ng, Manoranjan Dash
SIGIR
2010
ACM
13 years 9 months ago
Learning to rank query reformulations
Query reformulation techniques based on query logs have recently proven to be effective for web queries. However, when initial queries have reasonably good quality, these techniqu...
Van Dang, Michael Bendersky, W. Bruce Croft
ICASSP
2010
IEEE
13 years 9 months ago
Balancing false alarms and hits in Spoken Term Detection
This paper presents methods to improve retrieval of Out-OfVocabulary (OOV) terms in a Spoken Term Detection (STD) system. We demonstrate that automated tagging of OOV regions help...
Carolina Parada, Abhinav Sethy, Bhuvana Ramabhadra...