Sciweavers

9260 search results - page 1783 / 1852
» Posterior distributions are computable from predictive distr...
Sort
View
HT
2003
ACM
15 years 5 months ago
Enhanced web document summarization using hyperlinks
This paper addresses the issue of Web document summarization. As textual content of Web documents is often scarce or irrelevant and existing summarization techniques are based on ...
Jean-Yves Delort, Bernadette Bouchon-Meunier, Mari...
IMC
2003
ACM
15 years 5 months ago
Constructing internet coordinate system based on delay measurement
In this paper, we consider the problem of how to represent the locations of Internet hosts in a Cartesian coordinate system to facilitate estimate of the network distance between ...
Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi
104
Voted
ISPD
2003
ACM
110views Hardware» more  ISPD 2003»
15 years 5 months ago
Explicit gate delay model for timing evaluation
Delay evaluation is always a crucial concern in the VLSI design and it becomes increasingly more critical in the nowadays deep-submicron technology. To obtain an accurate delay va...
Muzhou Shao, Martin D. F. Wong, Huijing Cao, Youxi...
114
Voted
PLDI
2003
ACM
15 years 5 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
126
Voted
CCS
2003
ACM
15 years 5 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
« Prev « First page 1783 / 1852 Last » Next »