Sciweavers

1418 search results - page 253 / 284
» How to Explain Mistakes
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
VSTTE
2010
Springer
13 years 6 months ago
Dafny Meets the Verification Benchmarks Challenge
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verif...
K. Rustan M. Leino, Rosemary Monahan
TOMCCAP
2011
145views more  TOMCCAP 2011»
13 years 3 months ago
A framework for cross-layer optimization of video streaming in wireless networks
tion problem in two steps. First, we formulate an abstract optimization problem for video streaming in wireless networks in general. This formulation exposes the important interact...
Cheng-Hsin Hsu, Mohamed Hefeeda
WSDM
2012
ACM
283views Data Mining» more  WSDM 2012»
12 years 4 months ago
The life and death of online groups: predicting group growth and longevity
We pose a fundamental question in understanding how to identify and design successful communities: What factors predict whether a community will grow and survive in the long term?...
Sanjay Ram Kairam, Dan J. Wang, Jure Leskovec
KDD
2012
ACM
222views Data Mining» more  KDD 2012»
11 years 11 months ago
Rise and fall patterns of information diffusion: model and implications
The recent explosion in the adoption of search engines and new media such as blogs and Twitter have facilitated faster propagation of news and rumors. How quickly does a piece of ...
Yasuko Matsubara, Yasushi Sakurai, B. Aditya Praka...