Sciweavers

236 search results - page 43 / 48
» How Can Intra Correlation Be Exploited Better
Sort
View
USS
2008
13 years 10 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ICTIR
2009
Springer
13 years 6 months ago
An Effective Approach to Verbose Queries Using a Limited Dependencies Language Model
Intuitively, any `bag of words' approach in IR should benefit from taking term dependencies into account. Unfortunately, for years the results of exploiting such dependencies ...
Eduard Hoenkamp, Peter Bruza, Dawei Song, Qiang Hu...
INFOCOM
2003
IEEE
14 years 1 months ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...
ISRR
2005
Springer
201views Robotics» more  ISRR 2005»
14 years 1 months ago
Advances in High Resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by the mismatch between available navigation as compared to sensor accuracy. In this paper we present ...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
CN
1998
207views more  CN 1998»
13 years 8 months ago
The Anatomy of a Large-Scale Hypertextual Web Search Engine
In this paper, we present Google, a prototype of a large-scale search engine which makes heavy use of the structure present in hypertext. Google is designed to crawl and index the...
Sergey Brin, Lawrence Page