Sciweavers

38890 search results - page 7752 / 7778
» Will It Work
Sort
View
ACL
2012
11 years 11 months ago
Finding Bursty Topics from Microblogs
Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Al...
Qiming Diao, Jing Jiang, Feida Zhu, Ee-Peng Lim
ACL
2012
11 years 11 months ago
You Had Me at Hello: How Phrasing Affects Memorability
Understanding the ways in which information achieves widespread public awareness is a research question of significant interest. We consider whether, and how, the way in which th...
Cristian Danescu-Niculescu-Mizil, Justin Cheng, Jo...
PKC
2012
Springer
234views Cryptology» more  PKC 2012»
11 years 11 months ago
Ring-LWE in Polynomial Rings
Abstract. The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still,...
Léo Ducas, Alain Durmus
ICDT
2012
ACM
242views Database» more  ICDT 2012»
11 years 11 months ago
Win-move is coordination-free (sometimes)
In a recent paper by Hellerstein [15], a tight relationship was conjectured between the number of strata of a Datalog¬ program and the number of “coordination stages” require...
Daniel Zinn, Todd J. Green, Bertram Ludäscher
ICDT
2012
ACM
235views Database» more  ICDT 2012»
11 years 11 months ago
Equivalence and minimization of conjunctive queries under combined semantics
The problems of query containment, equivalence, and minimization are recognized as very important in the context of query processing, specifically of query optimization. In their...
Rada Chirkova
« Prev « First page 7752 / 7778 Last » Next »