Sciweavers

2988 search results - page 366 / 598
» Experiments with a New Boosting Algorithm
Sort
View
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
SIGIR
2009
ACM
15 years 9 months ago
SUSHI: scoring scaled samples for server selection
Modern techniques for distributed information retrieval use a set of documents sampled from each server, but these samples have been underutilised in server selection. We describe...
Paul Thomas, Milad Shokouhi
CCGRID
2008
IEEE
15 years 9 months ago
Bad Words: Finding Faults in Spirit's Syslogs
—Accurate fault detection is a key element of resilient computing. Syslogs provide key information regarding faults, and are found on nearly all computing systems. Discovering ne...
Jon Stearley, Adam J. Oliner
IPPS
2008
IEEE
15 years 9 months ago
Junction tree decomposition for parallel exact inference
We present a junction tree decomposition based algorithm for parallel exact inference. This is a novel parallel exact inference method for evidence propagation in an arbitrary jun...
Yinglong Xia, Viktor K. Prasanna
ICRA
2007
IEEE
214views Robotics» more  ICRA 2007»
15 years 9 months ago
Triangulation Based Multi Target Tracking with Mobile Sensor Networks
Abstract— We study the problem of designing motionplanning and sensor assignment strategies for tracking multiple targets with a mobile sensor network. We focus on triangulation ...
Seema Kamath, Eric Meisner, Volkan Isler