Sciweavers

1558 search results - page 158 / 312
» Effective Analysis and Design of Computer-Supported Learning...
Sort
View
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
MM
2010
ACM
137views Multimedia» more  MM 2010»
15 years 4 months ago
Unsupervised summarization of rushes videos
This paper proposes a new framework to formulate the problem of rushes video summarization as an unsupervised learning problem. We pose the problem of video summarization as one o...
Yang Liu, Feng Zhou, Wei Liu, Fernando De la Torre...
ECSCW
2001
15 years 5 months ago
PolyLens: A recommender system for groups of user
We present PolyLens, a new collaborative filtering recommender system designed to recommend items for groups of users, rather than for individuals. A group recommender is more appr...
Mark O'Connor, Dan Cosley, Joseph A. Konstan, John...
202
Voted
SIGMETRICS
2010
ACM
113views Hardware» more  SIGMETRICS 2010»
14 years 10 months ago
Reliability analysis of deduplicated and erasure-coded storage
Space efficiency and data reliability are two primary concerns for modern storage systems. Chunk-based deduplication, which breaks up data objects into single-instance chunks that...
Xiaozhou Li, Mark Lillibridge, Mustafa Uysal
CSCW
2012
ACM
13 years 11 months ago
Come meet me at Ulduar: progression raiding in world of warcraft
In spite of decades of research on virtual worlds, our understanding of one popular form of virtual world behavior— raiding—remains limited. Raiding is important because it en...
Jeffrey Bardzell, Jeffrey Nichols, Tyler Pace, Sha...