Sciweavers

5643 search results - page 83 / 1129
» Retrieval Evaluation in Practice
Sort
View
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 4 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
ICDE
2007
IEEE
119views Database» more  ICDE 2007»
15 years 4 months ago
Practical Preference Relations for Large Data Sets
User-defined preferences allow personalized ranking of query results. A user provides a declarative specification of his/her preferences, and the system is expected to use that ...
Kenneth A. Ross, Peter J. Stuckey, Amélie M...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
15 years 10 months ago
Practical guide to controlled experiments on the web: listen to your customers not to the hippo
The web provides an unprecedented opportunity to evaluate ideas quickly using controlled experiments, also called randomized experiments (single-factor or factorial designs), A/B ...
Ron Kohavi, Randal M. Henne, Dan Sommerfield
CLEF
2005
Springer
15 years 3 months ago
CUHK at ImageCLEF 2005: Cross-Language and Cross-Media Image Retrieval
In this paper, we describe our studies of cross-language and cross-media image retrieval at the ImageCLEF 2005. This is the first participation of our CUHK (The Chinese University...
Steven C. H. Hoi, Jianke Zhu, Michael R. Lyu
SACMAT
2009
ACM
15 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...