Sciweavers

897 search results - page 69 / 180
» Identity: How to name it, How to find it
Sort
View
NSDI
2004
15 years 3 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
JMLR
2010
151views more  JMLR 2010»
14 years 8 months ago
Understanding the difficulty of training deep feedforward neural networks
Whereas before 2006 it appears that deep multilayer neural networks were not successfully trained, since then several algorithms have been shown to successfully train them, with e...
Xavier Glorot, Yoshua Bengio
CANDC
2005
ACM
15 years 1 months ago
Integer linear programming as a tool for constructing trees from quartet data
The task of the quartet puzzling problem is to find a best-fitting binary X-tree for a finite n-set from confidence values for the 3 n 4 binary trees with exactly four leaves from...
Jan Weyer-Menkhoff, Claudine Devauchelle, Alexande...
CEAS
2008
Springer
15 years 3 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
CHI
2008
ACM
16 years 2 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig