Sciweavers

8086 search results - page 1524 / 1618
» On the Implementation of Dynamic Patterns
Sort
View
155
Voted
TON
2012
13 years 6 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
149
Voted
PPSN
1990
Springer
15 years 7 months ago
Feature Construction for Back-Propagation
T h e ease of learning concepts f r o m examples in empirical machine learning depends on the attributes used for describing the training d a t a . We show t h a t decision-tree b...
Selwyn Piramuthu
138
Voted
ALMOB
2008
127views more  ALMOB 2008»
15 years 3 months ago
HuMiTar: A sequence-based method for prediction of human microRNA targets
Background: MicroRNAs (miRs) are small noncoding RNAs that bind to complementary/partially complementary sites in the 3' untranslated regions of target genes to regulate prot...
Jishou Ruan, Hanzhe Chen, Lukasz A. Kurgan, Ke Che...
171
Voted
WWW
2003
ACM
16 years 4 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...
149
Voted
EUROSYS
2007
ACM
16 years 24 days ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
« Prev « First page 1524 / 1618 Last » Next »