Sciweavers

1216 search results - page 123 / 244
» Hybrid type checking
Sort
View
DRM
2005
Springer
15 years 9 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
WKDD
2010
CPS
204views Data Mining» more  WKDD 2010»
15 years 9 months ago
A Scalable, Accurate Hybrid Recommender System
—Recommender systems apply machine learning techniques for filtering unseen information and can predict whether a user would like a given resource. There are three main types of...
Mustansar Ali Ghazanfar, Adam Prügel-Bennett
150
Voted
ISCA
2010
IEEE
222views Hardware» more  ISCA 2010»
15 years 5 months ago
Cohesion: a hybrid memory model for accelerators
Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to mana...
John H. Kelm, Daniel R. Johnson, William Tuohy, St...
CONEXT
2005
ACM
15 years 5 months ago
Hybrid reliable multicast with TCP-XM
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft, Marinho P. Barcellos, ...
CORR
2007
Springer
114views Education» more  CORR 2007»
15 years 3 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...