Sciweavers

7839 search results - page 349 / 1568
» What's there and what's not
Sort
View
USENIX
2008
15 years 4 months ago
Evaluating Distributed Systems: Does Background Traffic Matter?
Evaluating novel networked protocols and services requires subjecting the target system to realistic Internet conditions. However, there is no common understanding of what is requ...
Kashi Venkatesh Vishwanath, Amin Vahdat
115
Voted
CCS
2008
ACM
15 years 4 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
COLT
2008
Springer
15 years 3 months ago
Model Selection and Stability in k-means Clustering
Clustering Stability methods are a family of widely used model selection techniques applied in data clustering. Their unifying theme is that an appropriate model should result in ...
Ohad Shamir, Naftali Tishby
IE
2007
15 years 3 months ago
Citizenship and consumption: convergence culture, transmedia narratives and the digital divide
Henry Jenkins’ recent publications on convergence have focused on the way that the active audience, equipped with the productive and distributive tools of digital technology mig...
Thomas Apperley
ASUNAM
2010
IEEE
15 years 3 months ago
Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
Sofus A. Macskassy