Sciweavers

4498 search results - page 577 / 900
» How to Invent Functions
Sort
View
ECOOP
2009
Springer
16 years 5 months ago
Making Sense of Large Heaps
Abstract. It is common for large-scale Java applications to suffer memory problems, whether inefficient designs that impede scalability, or lifetime bugs such as leaks. Making sens...
Nick Mitchell, Edith Schonberg, Gary Sevitsky
ICIAP
2009
ACM
16 years 5 months ago
A New Generative Feature Set Based on Entropy Distance for Discriminative Classification
Abstract. Score functions induced by generative models extract fixeddimensions feature vectors from different-length data observations by subsuming the process of data generation, ...
Alessandro Perina, Marco Cristani, Umberto Castell...
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
16 years 5 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
MOBIHOC
2009
ACM
16 years 5 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 5 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin