Sciweavers

561 search results - page 82 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
STOC
2005
ACM
144views Algorithms» more  STOC 2005»
16 years 4 months ago
Pseudorandom generators for low degree polynomials
We investigate constructions of pseudorandom generators that fool polynomial tests of degree d in m variables over finite fields F. Our main construction gives a generator with se...
Andrej Bogdanov
136
Voted
SDM
2009
SIAM
161views Data Mining» more  SDM 2009»
16 years 1 months ago
Feature Weighted SVMs Using Receiver Operating Characteristics.
Support Vector Machines (SVMs) are a leading tool in classification and pattern recognition and the kernel function is one of its most important components. This function is used...
Shaoyi Zhang, M. Maruf Hossain, Md. Rafiul Hassan,...
HRI
2009
ACM
15 years 10 months ago
An information pipeline model of human-robot interaction
This paper investigates the potential usefulness of viewing the system of human, robot, and environment as an “information pipeline” from environment to user and back again. I...
Kevin Gold
SIGMETRICS
2009
ACM
149views Hardware» more  SIGMETRICS 2009»
15 years 10 months ago
On the treeness of internet latency and bandwidth
Existing empirical studies of Internet structure and path properties indicate that the Internet is tree-like. This work quantifies the degree to which at least two important Inte...
Venugopalan Ramasubramanian, Dahlia Malkhi, Fabian...
SBACPAD
2008
IEEE
170views Hardware» more  SBACPAD 2008»
15 years 10 months ago
Using Analytical Models to Efficiently Explore Hardware Transactional Memory and Multi-Core Co-Design
Transactional memory is emerging as a parallel programming paradigm for multi-core processors. Despite the recent interest in transactional memory, there has been no study to char...
James Poe, Chang-Burm Cho, Tao Li