Sciweavers

1056 search results - page 23 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
AAAI
2000
13 years 9 months ago
Exploiting a Thesaurus-Based Semantic Net for Knowledge-Based Search
With the growth of on-line information, the need for better resource location services is growing rapidly. A popular goal is to conduct search in terms of concepts, rather than wo...
Peter Clark, John Thompson, Heather Holmback, Lisb...
FIRSTMONDAY
2006
70views more  FIRSTMONDAY 2006»
13 years 7 months ago
Beyond binary choices: Understanding and exploiting trade-offs to enhance creativity
Many research approaches are conceptualized as binary choices, representing endpoints of a spectrum (each of them providing important perspectives within their own discourses). Des...
Gerhard Fischer
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
14 years 7 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
ISCA
2005
IEEE
105views Hardware» more  ISCA 2005»
14 years 1 months ago
Exploiting Structural Duplication for Lifetime Reliability Enhancement
Increased power densities (and resultant temperatures) and other effects of device scaling are predicted to cause significant lifetime reliability problems in the near future. In...
Jayanth Srinivasan, Sarita V. Adve, Pradip Bose, J...