Sciweavers

13553 search results - page 2677 / 2711
» A Generalized Multi-View Approach
Sort
View
CCS
2010
ACM
14 years 9 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
EGH
2010
Springer
14 years 9 months ago
GPU random numbers via the tiny encryption algorithm
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) a...
Fahad Zafar, Marc Olano, Aaron Curtis
EMNLP
2010
14 years 9 months ago
Learning Recurrent Event Queries for Web Search
Recurrent event queries (REQ) constitute a special class of search queries occurring at regular, predictable time intervals. The freshness of documents ranked for such queries is ...
Ruiqiang Zhang, Yuki Konda, Anlei Dong, Pranam Kol...
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
14 years 9 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos
ICIP
2010
IEEE
14 years 9 months ago
Deterministic structured network coding for WWAN video broadcast with cooperative peer-to-peer repair
Recent research has exploited the multi-homing property (one terminal with multiple network interfaces) of modern devices to improve communication performance in wireless networks...
Xin Liu, Gene Cheung, Chen-Nee Chuah
« Prev « First page 2677 / 2711 Last » Next »