Sciweavers

2173 search results - page 398 / 435
» The History of the History of Software
Sort
View
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 1 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
15 years 1 months ago
Online discovery and maintenance of time series motifs
The detection of repeated subsequences, time series motifs, is a problem which has been shown to have great utility for several higher-level data mining algorithms, including clas...
Abdullah Mueen, Eamonn J. Keogh
AI50
2006
15 years 1 months ago
Philosophical Foundations of AI
Artificial Intelligence was born in 1956 as the off-spring of the newly-created cognitivist paradigm of cognition. As such, it inherited a strong philosophical legacy of functional...
David Vernon, Dermot Furlong
ANTS
2006
Springer
73views Algorithms» more  ANTS 2006»
15 years 1 months ago
The Elliptic Curve Database for Conductors to 130000
Abstract. Tabulating elliptic curves has been carried out since the earliest days of machine computation in number theory. After some historical remarks, we report on significant r...
John Cremona
ECAI
2006
Springer
15 years 1 months ago
Auction Mechanisms for Efficient Advertisement Selection on Public Displays
Public electronic displays can be used as an advertising medium when space is a scarce resource, and it is desirable to expose many adverts to as wide an audience as possible. Alth...
Terry R. Payne, Esther David, Nicholas R. Jennings...