Sciweavers

26354 search results - page 5125 / 5271
» How we refactor, and how we know it
Sort
View
ATAL
2010
Springer
15 years 1 months ago
Evaluating models of speaker head nods for virtual agents
Virtual human research has often modeled nonverbal behaviors based on the findings of psychological research. In recent years, however, there have been growing efforts to use auto...
Jina Lee, Zhiyang Wang, Stacy Marsella
MM
2010
ACM
137views Multimedia» more  MM 2010»
15 years 1 months ago
Self-diagnostic peer-assisted video streaming through a learning framework
Quality control and resource optimization are challenging problems in peer-assisted video streaming systems, due to their large scales and unreliable peer behavior. Such systems a...
Di Niu, Baochun Li, Shuqiao Zhao
CCS
2010
ACM
15 years 1 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CCS
2010
ACM
15 years 1 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
118
Voted
WWW
2010
ACM
15 years 1 months ago
Using a model of social dynamics to predict popularity of news
Popularity of content in social media is unequally distributed, with some items receiving a disproportionate share of attention from users. Predicting which newly-submitted items ...
Kristina Lerman, Tad Hogg
« Prev « First page 5125 / 5271 Last » Next »