Sciweavers

1667 search results - page 328 / 334
» Recommender systems in e-commerce
Sort
View
ASPLOS
2006
ACM
15 years 1 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
CIVR
2008
Springer
152views Image Analysis» more  CIVR 2008»
15 years 1 months ago
Evaluating audio skimming and frame rate acceleration for summarizing BBC rushes
For the first time in 2007, TRECVID considered structured evaluation of automated video summarization, utilizing BBC rushes video. In 2007, we conducted user evaluations with the ...
Michael G. Christel, Wei-Hao Lin, Bryan Maher
DIMVA
2010
15 years 1 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
NSDI
2010
15 years 1 months ago
Volley: Automated Data Placement for Geo-Distributed Cloud Services
: As cloud services grow to span more and more globally distributed datacenters, there is an increasingly urgent need for automated mechanisms to place application data across thes...
Sharad Agarwal, John Dunagan, Navendu Jain, Stefan...
SDM
2010
SIAM
146views Data Mining» more  SDM 2010»
15 years 1 months ago
Towards Finding Valuable Topics
Enterprises depend on their information workers finding valuable information to be productive. However, existing enterprise search and recommendation systems can exploit few studi...
Zhen Wen, Ching-Yung Lin