Sciweavers

2194 search results - page 256 / 439
» Improving HLRTA*( k )
Sort
View
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 7 months ago
On the Lower Bound of Local Optimums in K-Means Algorithm
The k-means algorithm is a popular clustering method used in many different fields of computer science, such as data mining, machine learning and information retrieval. However, ...
Zhenjie Zhang, Bing Tian Dai, Anthony K. H. Tung
ASPLOS
2006
ACM
15 years 7 months ago
Portability events: a programming model for scalable system infrastructures
Clustered Objects (COs) [1] have been proven to be an effective ion for improving scalability of systems software [2, 3]. But can we devise a programming model that would allow CO...
Chris Matthews, Yvonne Coady, Jonathan Appavoo
WCRE
2005
IEEE
15 years 7 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
PODS
2005
ACM
86views Database» more  PODS 2005»
15 years 7 months ago
An incremental algorithm for computing ranked full disjunctions
The full disjunction is a variation of the join operator that maximally combines tuples from connected relations, while preserving all information in the relations. The full disju...
Sara Cohen, Yehoshua Sagiv
WPES
2005
ACM
15 years 7 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk