Sciweavers

1018 search results - page 177 / 204
» Generative unbinding of names
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Efficient Data Harvesting in Mobile Sensor Platforms
In this paper we study the use of vehicles as sensors in a "vehicular sensor network," a new network paradigm that is critical for gathering valuable information in urba...
Uichin Lee, Eugenio Magistretti, Biao Zhou, Mario ...
WSDM
2010
ACM
188views Data Mining» more  WSDM 2010»
14 years 5 months ago
Anatomy of the Long Tail: Ordinary People with Extraordinary Tastes
The success of "infinite-inventory" retailers such as Amazon.com and Netflix has been ascribed to a "long tail" phenomenon. To wit, while the majority of their...
Andrei Z. Broder, Bo Pang, Evgeniy Gabrilovich, Sh...
ICCAD
2004
IEEE
114views Hardware» more  ICCAD 2004»
14 years 4 months ago
High-level synthesis using computation-unit integrated memories
Abstract— High-level synthesis (HLS) of memory-intensive applications has featured several innovations in terms of enhancements made to the basic memory organization and data lay...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
STACS
2010
Springer
14 years 2 months ago
Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion
Kabanets and Impagliazzo [KI04] show how to decide the circuit polynomial identity testing problem (CPIT) in deterministic subexponential time, assuming hardness of some explicit ...
Maurice Jansen