Sciweavers

2662 search results - page 375 / 533
» Objects-early tools: a demonstration
Sort
View

Publication
197views
13 years 6 months ago
Convex non-negative matrix factorization for massive datasets
Non-negative matrix factorization (NMF) has become a standard tool in data mining, information retrieval, and signal processing. It is used to factorize a non-negative data matrix ...
C. Thurau, K. Kersting, M. Wahabzada, and C. Bauck...
128
Voted
POPL
2012
ACM
13 years 5 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
121
Voted
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
VR
2012
IEEE
337views Virtual Reality» more  VR 2012»
13 years 5 months ago
VRMDS: an intuitive virtual environment for supporting the conceptual design of mechanisms
This paper presents Virtual Reality Mechanism Design Studio (VRMDS), an intuitive virtual environment for supporting the interactive design and simulation of mechanisms. The studio...
Juan Camilo Alvarez, Hai-Jun Su
SIGCOMM
2012
ACM
13 years 17 days ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...