Sciweavers

2842 search results - page 523 / 569
» Expansion and Search in Networks
Sort
View
CCS
2010
ACM
13 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
ICASSP
2010
IEEE
13 years 10 months ago
Morphology-based and sub-word language modeling for Turkish speech recognition
We explore morphology-based and sub-word language modeling approaches proposed for morphologically rich languages, and evaluate and contrast them for Turkish broadcast news transc...
Hasim Sak, Murat Saraclar, Tunga Güngör
CGF
2010
155views more  CGF 2010»
13 years 10 months ago
SmallWorlds: Visualizing Social Recommendations
We present SmallWorlds, a visual interactive graph-based interface that allows users to specify, refine and build item-preference profiles in a variety of domains. The interface f...
Brynjar Gretarsson, John O'Donovan, Svetlin Bostan...
CN
2010
136views more  CN 2010»
13 years 10 months ago
PCIR: Combining DHTs and peer clusters for efficient full-text P2P indexing
Distributed hash tables (DHTs) are very efficient for querying based on key lookups. However, building huge term indexes, as required for IR-style keyword search, poses a scalabil...
Odysseas Papapetrou, Wolf Siberski, Wolfgang Nejdl
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 10 months ago
Opportunistic Collaborative Beamforming with One-Bit Feedback
An energy-efficient opportunistic collaborative beamformer with one-bit feedback is proposed for ad hoc sensor networks over Rayleigh fading channels. In contrast to conventional c...
Man-On Pun, D. Richard Brown III, H. Vincent Poor