Sciweavers

237 search results - page 28 / 48
» Just enough tabling
Sort
View
RECSYS
2009
ACM
15 years 10 months ago
Preference elicitation with subjective features
Utility or preference elicitation is a critical component in many recommender and decision support systems. However, most frameworks for elicitation assume a predefined set of fe...
Craig Boutilier, Kevin Regan, Paolo Viappiani
151
Voted
WIDM
2009
ACM
15 years 10 months ago
Distinct nearest neighbors queries for similarity search in very large multimedia databases
As the volume of multimedia data available on internet is tremendously increasing, the content-based similarity search becomes a popular approach to multimedia retrieval. The most...
Tomás Skopal, Vlastislav Dohnal, Michal Bat...
122
Voted
ISPASS
2008
IEEE
15 years 10 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
RTSS
2008
IEEE
15 years 10 months ago
Optimistic Reliability Aware Energy Management for Real-Time Tasks with Probabilistic Execution Times
Reliability-aware power management (RAPM) schemes have been recently studied to save energy while preserving system reliability. The existing RAPM schemes, however, provision for ...
Dakai Zhu, Hakan Aydin, Jian-Jia Chen
ACSAC
2007
IEEE
15 years 10 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski