Sciweavers

3676 search results - page 671 / 736
» Scalable component abstractions
Sort
View
128
Voted
NSDI
2007
15 years 2 months ago
Ricochet: Lateral Error Correction for Time-Critical Multicast
Ricochet is a low-latency reliable multicast protocol designed for time-critical clustered applications. It uses IP Multicast to transmit data and recovers from packet loss in end...
Mahesh Balakrishnan, Kenneth P. Birman, Amar Phani...
113
Voted
ICSE
2010
IEEE-ACM
15 years 2 months ago
SMT-based bounded model checking for multi-threaded software in embedded systems
The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification. Model checkers ...
Lucas Cordeiro
111
Voted
ESORICS
2008
Springer
15 years 2 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
DMIN
2008
158views Data Mining» more  DMIN 2008»
15 years 2 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
IJCAI
2007
15 years 2 months ago
Open Information Extraction from the Web
Traditionally, Information Extraction (IE) has focused on satisfying precise, narrow, pre-specified requests from small homogeneous corpora (e.g., extract the location and time o...
Michele Banko, Michael J. Cafarella, Stephen Soder...