Sciweavers

17920 search results - page 3505 / 3584
» Recentering computer science
Sort
View
118
Voted
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 4 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
95
Voted
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 4 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
112
Voted
EDBT
2009
ACM
156views Database» more  EDBT 2009»
15 years 4 months ago
Efficient skyline retrieval with arbitrary similarity measures
A skyline query returns a set of objects that are not dominated by other objects. An object is said to dominate another if it is closer to the query than the latter on all factors...
Deepak P, Prasad M. Deshpande, Debapriyo Majumdar,...
118
Voted
EMSOFT
2009
Springer
15 years 4 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
« Prev « First page 3505 / 3584 Last » Next »