Sciweavers

12052 search results - page 2260 / 2411
» computer 2010
Sort
View
WWW
2010
ACM
14 years 5 months ago
Visualizing differences in web search algorithms using the expected weighted hoeffding distance
We introduce a new dissimilarity function for ranked lists, the expected weighted Hoeffding distance, that has several advantages over current dissimilarity measures for ranked s...
Mingxuan Sun, Guy Lebanon, Kevyn Collins-Thompson
WWW
2010
ACM
14 years 5 months ago
Pusic: musicalize microblog messages for summarization and exploration
Micro-blogging services provide platforms for users to share their feelings and ideas on the go. Desiging to produce information stream in almost micro-blogging services, although...
Cheng-Te Li, Hung-Che Lai, Chien-Tung Ho, Chien-Li...
WALCOM
2010
IEEE
230views Algorithms» more  WALCOM 2010»
14 years 5 months ago
Comparing RNA Structures with Biologically Relevant Operations Cannot Be Done without Strong Combinatorial Restrictions
Abstract. Arc-annotated sequences are useful for representing structural information of RNAs and have been extensively used for comparing RNA structures in both terms of sequence a...
Guillaume Blin, Sylvie Hamel, Stéphane Vial...
TACAS
2010
Springer
241views Algorithms» more  TACAS 2010»
14 years 5 months ago
Arrival Curves for Real-Time Calculus: The Causality Problem and Its Solutions
Abstract. The Real-Time Calculus (RTC) [16] is a framework to analyze heterogeneous real-time systems that process event streams of data. The streams are characterized by pairs of ...
Matthieu Moy, Karine Altisen
EDBTW
2010
Springer
14 years 5 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
« Prev « First page 2260 / 2411 Last » Next »