Sciweavers

9898 search results - page 1783 / 1980
» Measuring Multicore Performance
Sort
View
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 7 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
ICAIL
2007
ACM
15 years 7 months ago
Opinion mining in legal blogs
We perform a survey into the scope and utility of opinion mining in legal Weblogs (a.k.a. blawgs). The number of `blogs' in the legal domain is growing at a rapid pace and ma...
Jack G. Conrad, Frank Schilder
ICC
2007
IEEE
115views Communications» more  ICC 2007»
15 years 7 months ago
Super-Wideband SSN Suppression in High-Speed Digital Communication Systems by Using Multi-Via Electromagnetic Bandgap Structures
With the advance of semiconductor manufacturing, There are many approaches to deal with these problems. EDA, and VLSI design technologies, circuits with even higher Adding discrete...
MuShui Zhang, YuShan Li, LiPing Li, Chen Jia
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...
ALT
2004
Springer
15 years 7 months ago
Applications of Regularized Least Squares to Classification Problems
Abstract. We present a survey of recent results concerning the theoretical and empirical performance of algorithms for learning regularized least-squares classifiers. The behavior ...
Nicolò Cesa-Bianchi
« Prev « First page 1783 / 1980 Last » Next »