Sciweavers

164 search results - page 30 / 33
» Improving IP Geolocation using Query Logs
Sort
View
ICALP
2003
Springer
14 years 1 months ago
Quantum Search on Bounded-Error Inputs
Suppose we have n algorithms, quantum or classical, each computing some bit-value with bounded error probability. We describe a quantum algorithm that uses O( √ n) repetitions of...
Peter Høyer, Michele Mosca, Ronald de Wolf
WWW
2011
ACM
13 years 3 months ago
Ranking in context-aware recommender systems
As context is acknowledged as an important factor that can affect users’ preferences, many researchers have worked on improving the quality of recommender systems by utilizing ...
Minsuk Kahng, Sangkeun Lee, Sang-goo Lee
CN
2007
133views more  CN 2007»
13 years 8 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
STOC
2009
ACM
99views Algorithms» more  STOC 2009»
14 years 9 months ago
Testing juntas nearly optimally
A function on n variables is called a k-junta if it depends on at most k of its variables. In this article, we show that it is possible to test whether a function is a k-junta or ...
Eric Blais
ASPLOS
2011
ACM
13 years 4 days ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...