Sciweavers

120 search results - page 19 / 24
» Loops under Strategies ... Continued
Sort
View
ICCAD
2006
IEEE
146views Hardware» more  ICCAD 2006»
14 years 5 months ago
An analytical model for negative bias temperature instability
— Negative Bias Temperature Instability (NBTI) in PMOS transistors has become a significant reliability concern in present day digital circuit design. With continued scaling, th...
Sanjay V. Kumar, Chris H. Kim, Sachin S. Sapatneka...
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
14 years 3 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
ICDM
2009
IEEE
111views Data Mining» more  ICDM 2009»
14 years 3 months ago
A Game Theoretical Model for Adversarial Learning
Abstract—It is now widely accepted that in many situations where classifiers are deployed, adversaries deliberately manipulate data in order to reduce the classifier’s accura...
Wei Liu, Sanjay Chawla
CSB
2005
IEEE
139views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Predicting gene function by combining expression and interaction data
In this study we combined the spurious protein interaction data from the Database of Interacting Proteins with the recently published gene expression data of S. cerevisiae grown w...
Rogier J. P. van Berlo, Lodewyk F. A. Wessels, S. ...
HT
2004
ACM
14 years 2 months ago
Saving private hypertext: requirements and pragmatic dimensions for preservation
The preservation of literary hypertexts presents significant challenges if we are to ensure continued access to them as the underlying technology changes. Not only does such an ef...
Catherine C. Marshall, Gene Golovchinsky