Sciweavers

2494 search results - page 410 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
HPCA
2005
IEEE
14 years 10 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
WEBDB
2010
Springer
171views Database» more  WEBDB 2010»
14 years 3 months ago
Improved Recommendations via (More) Collaboration
We consider in this paper a popular class of recommender systems that are based on Collaborative Filtering (CF for short). CF is the process of predicting customer ratings to item...
Rubi Boim, Haim Kaplan, Tova Milo, Ronitt Rubinfel...
PR
2010
141views more  PR 2010»
13 years 4 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
ALGOSENSORS
2009
Springer
14 years 4 months ago
A Note on Uniform Power Connectivity in the SINR Model
In this paper we study the connectivity problem for wireless networks under the Signal to Interference plus Noise Ratio (SINR) model. Given a set of radio transmitters distributed ...
Chen Avin, Zvi Lotker, Francesco Pasquale, Yvonne ...
WDAG
2007
Springer
100views Algorithms» more  WDAG 2007»
14 years 4 months ago
Scalable Load-Distance Balancing
We introduce the problem of load-distance balancing in assigning users of a delay-sensitive networked application to servers. We model the service delay experienced by a user as a ...
Edward Bortnikov, Israel Cidon, Idit Keidar