Sciweavers

2357 search results - page 392 / 472
» Computing Refactorings of Behavior Models
Sort
View
CHI
2007
ACM
15 years 6 months ago
The truth about lying in online dating profiles
Online dating is a popular new tool for initiating romantic relationships, although recent research and media reports suggest that it may also be fertile ground for deception. Unl...
Jeffrey T. Hancock, Catalina L. Toma, Nicole Ellis...
DAC
2010
ACM
15 years 6 months ago
Representative path selection for post-silicon timing prediction under variability
The identification of speedpaths is required for post-silicon (PS) timing validation, and it is currently becoming timeconsuming due to manufacturing variations. In this paper we...
Lin Xie, Azadeh Davoodi
CCGRID
2004
IEEE
15 years 6 months ago
Data durability in peer to peer storage systems
In this paper we present a quantitative study of data survival in peer to peer storage systems. We first recall two main redundancy mechanisms: replication and erasure codes, whic...
G. Utard, Antoine Vernois
CCECE
2006
IEEE
15 years 6 months ago
Variable Step-Size Affine Projection Algorithm with a Weighted and Regularized Projection Matrix
This paper presents a forgetting factor scheme for variable step-size affine projection algorithms (APA). The proposed scheme uses a forgetting processed input matrix as the projec...
Tao Dai, Andy Adler, Behnam Shahrrava
132
Voted
CONEXT
2006
ACM
15 years 6 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...