Sciweavers

1084 search results - page 209 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
CIKM
2007
Springer
15 years 5 months ago
Generalizing from relevance feedback using named entity wildcards
Traditional adaptive filtering systems learn the user’s interests in a rather simple way – words from relevant documents are favored in the query model, while words from irre...
Abhimanyu Lad, Yiming Yang
117
Voted
MM
2005
ACM
184views Multimedia» more  MM 2005»
15 years 5 months ago
A peer-to-peer network for live media streaming using a push-pull approach
In this paper, we present an unstructured peer-to-peer network called GridMedia for live media streaming employing a push-pull approach. Each node in GridMedia randomly selects it...
Meng Zhang, Jian-Guang Luo, Li Zhao, Shi-Qiang Yan...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 3 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
NAACL
1994
15 years 29 days ago
Session 10: Government Panel
The Workshop included an extended group of presentations by selected US government agencies and an invited guest from the European Community. These presentations, amplified in the...
Oscar N. Garcia
105
Voted
IJET
2007
121views more  IJET 2007»
14 years 11 months ago
A Technology Based Program That Matches Enrichment Resources With Student Strengths
Remarkable advances in instructional communication technology (ICT) have now made is possible to provide high levels of enrichment and the kinds of curricular differentiation that...
Joseph S. Renzulli, Sally M. Reis