Sciweavers

1084 search results - page 209 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
114
Voted
CIKM
2007
Springer
15 years 8 months ago
Generalizing from relevance feedback using named entity wildcards
Traditional adaptive filtering systems learn the user’s interests in a rather simple way – words from relevant documents are favored in the query model, while words from irre...
Abhimanyu Lad, Yiming Yang
MM
2005
ACM
184views Multimedia» more  MM 2005»
15 years 7 months ago
A peer-to-peer network for live media streaming using a push-pull approach
In this paper, we present an unstructured peer-to-peer network called GridMedia for live media streaming employing a push-pull approach. Each node in GridMedia randomly selects it...
Meng Zhang, Jian-Guang Luo, Li Zhao, Shi-Qiang Yan...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 5 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
118
Voted
NAACL
1994
15 years 3 months ago
Session 10: Government Panel
The Workshop included an extended group of presentations by selected US government agencies and an invited guest from the European Community. These presentations, amplified in the...
Oscar N. Garcia
IJET
2007
121views more  IJET 2007»
15 years 1 months ago
A Technology Based Program That Matches Enrichment Resources With Student Strengths
Remarkable advances in instructional communication technology (ICT) have now made is possible to provide high levels of enrichment and the kinds of curricular differentiation that...
Joseph S. Renzulli, Sally M. Reis