Sciweavers

6601 search results - page 1166 / 1321
» Optimal Distributed Arc-Consistency
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
MOBICOM
2009
ACM
15 years 11 months ago
Capacity of large-scale CSMA wireless networks
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schem...
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
MOBICOM
2009
ACM
15 years 11 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
RECSYS
2009
ACM
15 years 11 months ago
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models
Previous work on using external aggregate rating information showed that this information can be incorporated in several different types of recommender systems and improves their...
Akhmed Umyarov, Alexander Tuzhilin
SIGIR
2009
ACM
15 years 11 months ago
Fast nonparametric matrix factorization for large-scale collaborative filtering
With the sheer growth of online user data, it becomes challenging to develop preference learning algorithms that are sufficiently flexible in modeling but also affordable in com...
Kai Yu, Shenghuo Zhu, John D. Lafferty, Yihong Gon...
« Prev « First page 1166 / 1321 Last » Next »