Sciweavers

5675 search results - page 113 / 1135
» Exploiting Chaos for Computation
Sort
View
124
Voted
MICCAI
2005
Springer
16 years 1 months ago
Exploiting Temporal Information in Functional Magnetic Resonance Imaging Brain Data
Functional Magnetic Resonance Imaging(fMRI) has enabled scientists to look into the active human brain, leading to a flood of new data, thus encouraging the development of new data...
Lei Zhang 0002, Dimitris Samaras, Dardo Tomasi, Ne...
KDD
2002
ACM
166views Data Mining» more  KDD 2002»
16 years 1 months ago
Exploiting response models: optimizing cross-sell and up-sell opportunities in banking
The banking industry regularly mounts campaigns to improve customer value by offering new products to existing customers. In recent years this approach has gained significant mome...
Andrew Storey, Marc-David Cohen
112
Voted
EUROSYS
2008
ACM
15 years 10 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
94
Voted
WWW
2010
ACM
15 years 7 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
15 years 7 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...