Sciweavers

8699 search results - page 1686 / 1740
» Elements of the Theory of Computation
Sort
View
SIGIR
2005
ACM
15 years 4 months ago
Orthogonal locality preserving indexing
We consider the problem of document indexing and representation. Recently, Locality Preserving Indexing (LPI) was proposed for learning a compact document subspace. Different from...
Deng Cai, Xiaofei He
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
15 years 4 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...
CCS
2005
ACM
15 years 4 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CIKM
2005
Springer
15 years 4 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
ESA
2005
Springer
108views Algorithms» more  ESA 2005»
15 years 4 months ago
Bootstrapping a Hop-Optimal Network in the Weak Sensor Model
Sensor nodes are very weak computers that get distributed at random on a surface. Once deployed, they must wake up and form a radio network. Sensor network bootstrapping research t...
Martin Farach-Colton, Rohan J. Fernandes, Miguel A...
« Prev « First page 1686 / 1740 Last » Next »