Sciweavers

1265 search results - page 210 / 253
» Better Burst Detection
Sort
View
141
Voted
CSFW
2011
IEEE
14 years 3 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
145
Voted
COMSNETS
2012
168views more  COMSNETS 2012»
13 years 11 months ago
Limitations of scanned human copresence encounters for modelling proximity-borne malware
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...
149
Voted
PC
2012
223views Management» more  PC 2012»
13 years 11 months ago
Using shared arrays in message-driven parallel programs
This paper describes a safe and efficient combination of the object-based message-driven execution and shared array parallel programming models. In particular, we demonstrate how ...
Phil Miller, Aaron Becker, Laxmikant V. Kalé...
142
Voted
PLDI
2012
ACM
13 years 6 months ago
Parcae: a system for flexible parallel execution
Workload, platform, and available resources constitute a parallel program’s execution environment. Most parallelization efforts statically target an anticipated range of environ...
Arun Raman, Ayal Zaks, Jae W. Lee, David I. August
154
Voted
CVPR
2012
IEEE
13 years 6 months ago
A grammar for hierarchical object descriptions in logic programs
Modeling objects using formal grammars has recently regained much attention in computer vision. Probabilistic logic programming, such as Bilattice based Logical Reasoning (BLR), i...
Toufiq Parag, Claus Bahlmann, Vinay D. Shet, Manee...