Sciweavers

1056 search results - page 103 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
DAC
2008
ACM
14 years 11 months ago
Predictive runtime verification of multi-processor SoCs in SystemC
Concurrent interaction of multi-processor systems result in errors which are difficult to find. Traditional simulationbased verification techniques remove the concurrency informat...
Alper Sen, Vinit Ogale, Magdy S. Abadir
ICML
2009
IEEE
14 years 11 months ago
Unsupervised hierarchical modeling of locomotion styles
This paper describes an unsupervised learning technique for modeling human locomotion styles, such as distinct related activities (e.g. running and striding) or variations of the ...
Wei Pan, Lorenzo Torresani
ICML
1998
IEEE
14 years 11 months ago
Learning Collaborative Information Filters
Predicting items a user would like on the basis of other users' ratings for these items has become a well-established strategy adopted by many recommendation services on the ...
Daniel Billsus, Michael J. Pazzani
WWW
2009
ACM
14 years 10 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
WWW
2008
ACM
14 years 10 months ago
Using the wisdom of the crowds for keyword generation
In the sponsored search model, search engines are paid by businesses that are interested in displaying ads for their site alongside the search results. Businesses bid for keywords...
Ariel Fuxman, Panayiotis Tsaparas, Kannan Achan, R...