Sciweavers

11121 search results - page 2001 / 2225
» Computing with Continuous Change
Sort
View
ACSAC
2010
IEEE
15 years 1 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
COMPIMAGE
2010
Springer
15 years 1 months ago
On the Effects of Normalization in Adaptive MRF Hierarchies
Abstract. In this paper, we analyze the effects of energy normalization in adaptivehierarchy-based energy minimization methods. Adaptive hierarchies provide a nt multi-level abstra...
Albert Y. C. Chen, Jason J. Corso
GAMESEC
2010
128views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
Tracking Games in Mobile Networks
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...
GLOBECOM
2010
IEEE
15 years 1 months ago
Reinforcement Learning for Link Adaptation in MIMO-OFDM Wireless Systems
Machine learning algorithms have recently attracted much interest for effective link adaptation due to their flexibility and ability to capture more environmental effects implicitl...
Sungho Yun, Constantine Caramanis
MICRO
2010
IEEE
167views Hardware» more  MICRO 2010»
15 years 1 months ago
Erasing Core Boundaries for Robust and Configurable Performance
Single-thread performance, reliability and power efficiency are critical design challenges of future multicore systems. Although point solutions have been proposed to address thes...
Shantanu Gupta, Shuguang Feng, Amin Ansari, Scott ...
« Prev « First page 2001 / 2225 Last » Next »