Sciweavers

1103 search results - page 79 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
RSP
2005
IEEE
107views Control Systems» more  RSP 2005»
14 years 1 months ago
Rapid Prototyping of Embedded Software Using Selective Formalism
Our software synthesis tool, CSP++, generates C++ source code from verifiable CSPm specifications, and includes a framework for runtime execution. Our technique of selective for...
John D. Carter, Ming Xu, William B. Gardner
FOCS
2002
IEEE
14 years 29 days ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
INFOCOM
2010
IEEE
13 years 6 months ago
Efficient Similarity Estimation for Systems Exploiting Data Redundancy
Many modern systems exploit data redundancy to improve efficiency. These systems split data into chunks, generate identifiers for each of them, and compare the identifiers among ot...
Kanat Tangwongsan, Himabindu Pucha, David G. Ander...
IMC
2006
ACM
14 years 2 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
SIGIR
2009
ACM
14 years 2 months ago
Predicting user interests from contextual information
Search and recommendation systems must include contextual information to effectively model users’ interests. In this paper, we present a systematic study of the effectiveness of...
Ryen W. White, Peter Bailey, Liwei Chen