Sciweavers

1913 search results - page 114 / 383
» Group Input Machine
Sort
View
126
Voted
DIMVA
2008
15 years 4 months ago
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other...
Emanuele Passerini, Roberto Paleari, Lorenzo Marti...
123
Voted
DAGM
2010
Springer
15 years 3 months ago
Random Fourier Approximations for Skewed Multiplicative Histogram Kernels
Abstract. Approximations based on random Fourier features have recently emerged as an efficient and elegant methodology for designing large-scale kernel machines [4]. By expressing...
Fuxin Li, Catalin Ionescu, Cristian Sminchisescu
221
Voted
ECTEL
2011
Springer
14 years 2 months ago
Remote Collaborative Multi-user Informal Learning Experiences: Design and Evaluation
This paper presents a customizable system used to develop a collaborative multi-user problem solving game. It addresses the increasing demand for appealing informal learning experi...
Ernesto Arroyo, Valeria Righi, Roger Tarrago, Patr...
BMCBI
2007
162views more  BMCBI 2007»
15 years 2 months ago
Genome-wide identification of specific oligonucleotides using artificial neural network and computational genomic analysis
Background: Genome-wide identification of specific oligonucleotides (oligos) is a computationallyintensive task and is a requirement for designing microarray probes, primers, and ...
Chun-Chi Liu, Chin-Chung Lin, Ker-Chau Li, Wen-Shy...
184
Voted
REPLICATION
2010
15 years 1 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman