Sciweavers

7379 search results - page 1177 / 1476
» Distributed vector architectures
Sort
View
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
16 years 4 months ago
Extracting key-substring-group features for text classification
In many text classification applications, it is appealing to take every document as a string of characters rather than a bag of words. Previous research studies in this area mostl...
Dell Zhang, Wee Sun Lee
STOC
2005
ACM
156views Algorithms» more  STOC 2005»
16 years 4 months ago
Convex programming for scheduling unrelated parallel machines
We consider the classical problem of scheduling parallel unrelated machines. Each job is to be processed by exactly one machine. Processing job j on machine i requires time pij . ...
Yossi Azar, Amir Epstein
STOC
2004
ACM
145views Algorithms» more  STOC 2004»
16 years 4 months ago
Using mixture models for collaborative filtering
A collaborative filtering system at an e-commerce site or similar service uses data about aggregate user behavior to make recommendations tailored to specific user interests. We d...
Jon M. Kleinberg, Mark Sandler
MOBISYS
2008
ACM
16 years 3 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
MOBIHOC
2002
ACM
16 years 3 months ago
Routing performance in the presence of unidirectional links in multihop wireless networks
We examine two aspects concerning the influence of unidirectional links on routing performance in multihop wireless networks. In the first part of the paper, we evaluate the benef...
Mahesh K. Marina, Samir Ranjan Das
« Prev « First page 1177 / 1476 Last » Next »