Sciweavers

3823 search results - page 483 / 765
» Experiments with Random Projection
Sort
View
158
Voted
HPCA
2009
IEEE
16 years 3 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
245
Voted
POPL
2007
ACM
16 years 3 months ago
Program verification as probabilistic inference
In this paper, we propose a new algorithm for proving the validity or invalidity of a pre/postcondition pair for a program. The algorithm is motivated by the success of the algori...
Sumit Gulwani, Nebojsa Jojic
122
Voted
SDM
2009
SIAM
157views Data Mining» more  SDM 2009»
16 years 14 days ago
MUSK: Uniform Sampling of k Maximal Patterns.
Recent research in frequent pattern mining (FPM) has shifted from obtaining the complete set of frequent patterns to generating only a representative (summary) subset of frequent ...
Mohammad Al Hasan, Mohammed Javeed Zaki
CVPR
2010
IEEE
15 years 11 months ago
Segmenting Video Into Classes of Algorithm-Suitability
Given a set of algorithms, which one(s) should you apply to, i) compute optical flow, or ii) perform feature matching? Would looking at the sequence in question help you decide? I...
Oisin Mac Aodha, Gabriel Brostow, marc Pollefeys
SIGIR
2009
ACM
15 years 9 months ago
On social networks and collaborative recommendation
Social network systems, like last.fm, play a significant role in Web 2.0, containing large amounts of multimedia-enriched data that are enhanced both by explicit user-provided an...
Ioannis Konstas, Vassilios Stathopoulos, Joemon M....