Sciweavers

5595 search results - page 1042 / 1119
» Comparing Subsumption Optimizations
Sort
View
110
Voted
MOBICOM
2009
ACM
15 years 9 months ago
Dynamic spectrum access in DTV whitespaces: design rules, architecture and algorithms
In November 2008, the FCC ruled that the digital TV whitespaces be used for unlicensed access. This is an exciting development because DTV whitespaces are in the low frequency ran...
Supratim Deb, Vikram Srinivasan, Ritesh Maheshwari
136
Voted
RECSYS
2009
ACM
15 years 9 months ago
Recommending new movies: even a few ratings are more valuable than metadata
In the Netflix Prize competition many new collaborative filtering (CF) approaches emerged, which are excellent in optimizing the RMSE of the predictions. Matrix factorization (M...
István Pilászy, Domonkos Tikk
145
Voted
SMA
2009
ACM
223views Solid Modeling» more  SMA 2009»
15 years 9 months ago
Particle-based forecast mechanism for continuous collision detection in deformable environments
Collision detection in geometrically complex scenes is crucial in physical simulations and real time applications. Works based on spatial hierarchical structures have been propose...
Thomas Jund, David Cazier, Jean-François Du...
130
Voted
WWW
2010
ACM
15 years 9 months ago
Beyond position bias: examining result attractiveness as a source of presentation bias in clickthrough data
Leveraging clickthrough data has become a popular approach for evaluating and optimizing information retrieval systems. Although data is plentiful, one must take care when interpr...
Yisong Yue, Rajan Patel, Hein Roehrig
128
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1042 / 1119 Last » Next »