Sciweavers

1248 search results - page 249 / 250
» The I Test
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 9 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
CCS
2011
ACM
12 years 6 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
PAM
2012
Springer
12 years 1 months ago
OFLOPS: An Open Framework for OpenFlow Switch Evaluation
Recent efforts in software-defined networks, such as OpenFlow, give unprecedented access into the forwarding plane of networking equipment. When building a network based on OpenFl...
Charalampos Rotsos, Nadi Sarrar, Steve Uhlig, Rob ...
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
11 years 8 months ago
Factoring past exposure in display advertising targeting
Online advertising is increasingly becoming more performance oriented, where the decision to show an advertisement to a user is made based on the user’s propensity to respond to...
Neha Gupta, Abhimanyu Das, Sandeep Pandey, Vijay K...
CVPR
2012
IEEE
11 years 8 months ago
On SIFTs and their scales
Scale invariant feature detectors often find stable scales in only a few image pixels. Consequently, methods for feature matching typically choose one of two extreme options: mat...
Tal Hassner, Viki Mayzels, Lihi Zelnik-Manor