Sciweavers

1056 search results - page 3 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
COR
2011
13 years 10 days ago
Identifying and exploiting commonalities for the job-shop scheduling problem
Marnix Kammer, Marjan van den Akker, Han Hoogeveen
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 5 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
CHI
2011
ACM
12 years 9 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
CLEF
2009
Springer
13 years 3 months ago
Exploiting Speech Recognition Transcripts for Narrative Peak Detection in Short-Form Documentaries
Narrative peaks are points at which the viewer perceives a spike in the level of dramatic tension within the narrative flow of a video. This paper reports on four approaches to na...
Martha Larson, Bart Jochems, Ewine Smits, Roeland ...
ASPLOS
2012
ACM
12 years 1 months ago
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults
Future microprocessors need low-cost solutions for reliable operation in the presence of failure-prone devices. A promising approach is to detect hardware faults by deploying low-...
Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naei...