Sciweavers

8177 search results - page 1585 / 1636
» Detecting System Emulators
Sort
View
WWW
2010
ACM
14 years 5 months ago
Beyond position bias: examining result attractiveness as a source of presentation bias in clickthrough data
Leveraging clickthrough data has become a popular approach for evaluating and optimizing information retrieval systems. Although data is plentiful, one must take care when interpr...
Yisong Yue, Rajan Patel, Hein Roehrig
ACSAC
2008
IEEE
14 years 5 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
CGO
2008
IEEE
14 years 5 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
ICRA
2008
IEEE
471views Robotics» more  ICRA 2008»
14 years 5 months ago
Autonomous image-based exploration for mobile robot navigation
— Image-based navigation paradigms have recently emerged as an interesting alternative to conventional modelbased methods in mobile robotics. In this paper, we augment the existi...
D. Santosh, Supreeth Achar, C. V. Jawahar
IEEEIAS
2008
IEEE
14 years 5 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
« Prev « First page 1585 / 1636 Last » Next »