Sciweavers

17366 search results - page 3389 / 3474
» New Revision Algorithms
Sort
View
AUTONOMICS
2008
ACM
15 years 6 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
ICSE
2010
IEEE-ACM
15 years 6 months ago
SMT-based bounded model checking for multi-threaded software in embedded systems
The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification. Model checkers ...
Lucas Cordeiro
129
Voted
CCS
2008
ACM
15 years 6 months ago
When good instructions go bad: generalizing return-oriented programming to RISC
This paper reconsiders the threat posed by Shacham's "return-oriented programming" -- a technique by which WX-style hardware protections are evaded via carefully cr...
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan ...
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 6 months ago
Active learning for biomedical citation screening
Active learning (AL) is an increasingly popular strategy for mitigating the amount of labeled data required to train classifiers, thereby reducing annotator effort. We describe ...
Byron C. Wallace, Kevin Small, Carla E. Brodley, T...
139
Voted
CIKM
2008
Springer
15 years 6 months ago
Matching task profiles and user needs in personalized web search
Personalization has been deemed one of the major challenges in information retrieval with a significant potential for providing better search experience to individual users. Espec...
Julia Luxenburger, Shady Elbassuoni, Gerhard Weiku...
« Prev « First page 3389 / 3474 Last » Next »