Sciweavers

2237 search results - page 114 / 448
» On the Security of Random Sources
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Recommending random walks
We improve on previous recommender systems by taking advantage of the layered structure of software. We use a random-walk approach, mimicking the more focused behavior of a develo...
Zachary M. Saul, Vladimir Filkov, Premkumar T. Dev...
VLDB
2007
ACM
102views Database» more  VLDB 2007»
16 years 5 months ago
Randomized Algorithms for Data Reconciliation in Wide Area Aggregate Query Processing
Many aspects of the data integration problem have been considered in the literature: how to match schemas across different data sources, how to decide when different records refer...
Fei Xu, Chris Jermaine
GLOBECOM
2008
IEEE
15 years 11 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
155
Voted
TMI
2008
138views more  TMI 2008»
15 years 5 months ago
Accurate Event-Driven Motion Compensation in High-Resolution PET Incorporating Scattered and Random Events
With continuing improvements in spatial resolution of positron emission tomography (PET) scanners, small patient movements during PET imaging become a significant source of resolut...
Arman Rahmim, Katie Dinelle, Ju-Chieh Cheng, Mikha...
177
Voted
ACL
2010
15 years 3 months ago
Jointly Optimizing a Two-Step Conditional Random Field Model for Machine Transliteration and Its Fast Decoding Algorithm
This paper presents a joint optimization method of a two-step conditional random field (CRF) model for machine transliteration and a fast decoding algorithm for the proposed metho...
Dong Yang, Paul R. Dixon, Sadaoki Furui