Sciweavers

317 search results - page 52 / 64
» Who gives a tweet
Sort
View
ICISS
2005
Springer
14 years 2 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
14 years 2 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal
LCPC
2005
Springer
14 years 2 months ago
Compiler Supports and Optimizations for PAC VLIW DSP Processors
Abstract. Compiler is substantially regarded as the most essential component in the software toolchain to promote a successful processor design. This paper describes our preliminar...
Yung-Chia Lin, Chung-Lin Tang, Chung-Ju Wu, Ming-Y...
TGC
2005
Springer
14 years 2 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
MM
2004
ACM
118views Multimedia» more  MM 2004»
14 years 2 months ago
Articulation, the letter, and the spirit in the aesthetics of narrative
A furthered understanding of the aesthetic aspects of narrative is important to both people and machines who wish to author pleasing narratives. This paper gives an account of the...
Hugo Liu