Sciweavers

268 search results - page 43 / 54
» Cost-Aware Caching Algorithms for Distributed Storage Server...
Sort
View
145
Voted
WSDM
2009
ACM
140views Data Mining» more  WSDM 2009»
15 years 10 months ago
Effective latent space graph-based re-ranking model with global consistency
Recently the re-ranking algorithms have been quite popular for web search and data mining. However, one of the issues is that those algorithms treat the content and link informati...
Hongbo Deng, Michael R. Lyu, Irwin King
157
Voted
GECCO
2005
Springer
186views Optimization» more  GECCO 2005»
15 years 9 months ago
Subproblem optimization by gene correlation with singular value decomposition
Several ways of using singular value decomposition (SVD), a linear algebra technique typically used for information retrieval, to decompose problems into subproblems are investiga...
Jacob G. Martin
150
Voted
DRM
2007
Springer
15 years 10 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
178
Voted
MM
2010
ACM
215views Multimedia» more  MM 2010»
15 years 4 months ago
Sirio, orione and pan: an integrated web system for ontology-based video search and annotation
In this technical demonstration we show an integrated web system for video search and annotation based on ontologies. The system is composed by three components: the Orione1 ontol...
Marco Bertini, Gianpaolo D'Amico, Andrea Ferracani...
159
Voted
SOSP
2007
ACM
16 years 19 days ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...