Sciweavers

1474 search results - page 148 / 295
» Exploiting Locality in a TMS
Sort
View
CRITIS
2007
15 years 6 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
AAAI
2010
15 years 5 months ago
g-Planner: Real-time Motion Planning and Global Navigation using GPUs
We present novel randomized algorithms for solving global motion planning problems that exploit the computational capabilities of many-core GPUs. Our approach uses thread and data...
Jia Pan, Christian Lauterbach, Dinesh Manocha
AAAI
2010
15 years 5 months ago
Active Inference for Collective Classification
Labeling nodes in a network is an important problem that has seen a growing interest. A number of methods that exploit both local and relational information have been developed fo...
Mustafa Bilgic, Lise Getoor
EMNLP
2007
15 years 5 months ago
Improving Word Sense Disambiguation Using Topic Features
This paper presents a novel approach for exploiting the global context for the task of word sense disambiguation (WSD). This is done by using topic features constructed using the ...
Junfu Cai, Wee Sun Lee, Yee Whye Teh
HCI
2007
15 years 5 months ago
Culturally Adaptive Software: Moving Beyond Internationalization
So far, culture has played a minor role in the design of software. Our experience with imbuto, a program designed for Rwandan agricultural advisors, has shown that cultural adaptat...
Katharina Reinecke, Abraham Bernstein