Sciweavers

536 search results - page 11 / 108
» paste 2010
Sort
View
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
13 years 8 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
ICCBR
2010
Springer
13 years 7 months ago
Experience-Based Critiquing: Reusing Critiquing Experiences to Improve Conversational Recommendation
Product recommendation systems are now a key part of many e-commerce services and have proven to be a successful way to help users navigate complex product spaces. In this paper, w...
Kevin McCarthy, Yasser Salem, Barry Smyth
ENTCS
2006
80views more  ENTCS 2006»
13 years 8 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
ENTCS
2007
110views more  ENTCS 2007»
13 years 8 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
JEI
2010
171views more  JEI 2010»
13 years 7 months ago
Most apparent distortion: full-reference image quality assessment and the role of strategy
The mainstream approach to image quality assessment has centered around accurately modeling the single most relevant strategy employed by the human visual system (HVS) when judging...
Eric C. Larson, Damon M. Chandler