Sciweavers

621 search results - page 86 / 125
» chi 2008
Sort
View
PVLDB
2008
121views more  PVLDB 2008»
13 years 9 months ago
QueryScope: visualizing queries for repeatable database tuning
Reading and perceiving complex SQL queries has been a time consuming task in traditional database applications for decades. When it comes to decision support systems with automati...
Ling Hu, Kenneth A. Ross, Yuan-Chi Chang, Christia...
COLING
2008
13 years 11 months ago
Robust and Efficient Chinese Word Dependency Analysis with Linear Kernel Support Vector Machines
Data-driven learning based on shift reduce parsing algorithms has emerged dependency parsing and shown excellent performance to many Treebanks. In this paper, we investigate the e...
Yu-Chieh Wu, Jie-Chi Yang, Yue-Shi Lee
WICOMM
2008
83views more  WICOMM 2008»
13 years 10 months ago
iPTT: peer-to-peer push-to-talk for VoIP
This paper proposes iPTT, a peer-to-peer Push-to-Talk (PTT) service for Voice over IP (VoIP). In iPTT, a distributed and mobile-operator independent network architecture is presen...
Jiun-Ren Lin, Ai-Chun Pang, Yung-Chi Wang
TOG
2008
108views more  TOG 2008»
13 years 10 months ago
Texture amendment: reducing texture distortion in constrained parameterization
Constrained parameterization is an effective way to establish texture coordinates between a 3D surface and an existing image or photograph. A known drawback to constrained paramet...
Yu-Wing Tai, Michael S. Brown, Chi-Keung Tang, Heu...
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 10 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...