Sciweavers

44651 search results - page 8915 / 8931
» Generalized
Sort
View
96
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 11 days ago
Finding, minimizing, and counting weighted subgraphs
d Abstract] Virginia Vassilevska School of Mathematics Institute for Advanced Study Princeton, NJ 08540 USA virgi@math.ias.edu Ryan Williams School of Mathematics Institute for Adv...
Virginia Vassilevska, Ryan Williams
CCS
2009
ACM
16 years 11 days ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
SIGCSE
2009
ACM
213views Education» more  SIGCSE 2009»
16 years 10 days ago
Engaging middle school teachers and students with alice in a diverse set of subjects
This paper describes the integration of the Alice 3D virtual worlds environment into a diverse set of subjects in middle school, including the development of tutorials, example wo...
Susan H. Rodger, Jenna Hayes, Gaetjens Lezin, Henr...
SIGCSE
2009
ACM
167views Education» more  SIGCSE 2009»
16 years 10 days ago
Python CS1 as preparation for C++ CS2
How suitable is a Python-based CS1 course as preparation for a C++-based CS2 course? After fifteen years of using C++ for both CS1 and CS2, the Computer Science Department at Mich...
Richard J. Enbody, William F. Punch, Mark McCullen
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
16 years 9 days ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny
« Prev « First page 8915 / 8931 Last » Next »