Sciweavers

1310 search results - page 218 / 262
» Parameterized Partial Evaluation
Sort
View
STOC
2005
ACM
129views Algorithms» more  STOC 2005»
15 years 10 months ago
Learning with attribute costs
We study an extension of the "standard" learning models to settings where observing the value of an attribute has an associated cost (which might be different for differ...
Haim Kaplan, Eyal Kushilevitz, Yishay Mansour
EDBT
2002
ACM
141views Database» more  EDBT 2002»
15 years 9 months ago
Efficient OLAP Query Processing in Distributed Data Warehouses
Abstract. The success of Internet applications has led to an explosive growth in the demand for bandwidth from ISPs. Managing an IP network requires collecting and analyzing networ...
Michael O. Akinde, Michael H. Böhlen, Theodor...
ICFP
2002
ACM
15 years 9 months ago
Meta-programming with names and necessity
Meta-programming is a discipline of writing programs in a certain programming language that generate, manipulate or execute programs written in another language. In a typed settin...
Aleksandar Nanevski
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
ACSAC
2009
IEEE
15 years 4 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu