Sciweavers

8177 search results - page 1585 / 1636
» Detecting System Emulators
Sort
View
WWW
2010
ACM
15 years 7 months ago
Beyond position bias: examining result attractiveness as a source of presentation bias in clickthrough data
Leveraging clickthrough data has become a popular approach for evaluating and optimizing information retrieval systems. Although data is plentiful, one must take care when interpr...
Yisong Yue, Rajan Patel, Hein Roehrig
86
Voted
ACSAC
2008
IEEE
15 years 7 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
102
Voted
CGO
2008
IEEE
15 years 7 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
200
Voted
ICRA
2008
IEEE
471views Robotics» more  ICRA 2008»
15 years 7 months ago
Autonomous image-based exploration for mobile robot navigation
— Image-based navigation paradigms have recently emerged as an interesting alternative to conventional modelbased methods in mobile robotics. In this paper, we augment the existi...
D. Santosh, Supreeth Achar, C. V. Jawahar
146
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
« Prev « First page 1585 / 1636 Last » Next »