Sciweavers

6245 search results - page 1213 / 1249
» A Case for Aggregate Networks
Sort
View
147
Voted
RAID
2007
Springer
15 years 10 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
SEMWEB
2007
Springer
15 years 10 months ago
X-SOM Results for OAEI 2007
This paper summarizes the results of the X-SOM tool in the OAEI 2007 campaign. X-SOM is an extensible ontology mapper that combines various matching algorithms by means of a feed-f...
Carlo Curino, Giorgio Orsi, Letizia Tanca
IJCNN
2006
IEEE
15 years 10 months ago
Tentacled Self-Organizing Map for Effective Data Extraction
— Since we can accumulate a huge amount of data including useless information in these years, it is important to investigate various extraction method of clusters from data inclu...
Haruna Matsushita, Yoshifumi Nishio
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 10 months ago
A Floorplan-Aware Dynamic Inductive Noise Controller for Reliable Processor Design
Power delivery is a growing reliability concern in microprocessors as the industry moves toward feature-rich, powerhungrier designs. To battle the ever-aggravating power consumpti...
Fayez Mohamood, Michael B. Healy, Sung Kyu Lim, Hs...
119
Voted
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
15 years 10 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
« Prev « First page 1213 / 1249 Last » Next »