Sciweavers

2287 search results - page 451 / 458
» Making it Real
Sort
View
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 2 months ago
Recommender Systems by means of Information Retrieval
In this paper we present a method for reformulating the Recommender Systems problem in an Information Retrieval one. In our tests we have a dataset of users who give ratings for s...
Alberto Costa, Fabio Roda
INFOCOM
2011
IEEE
12 years 11 months ago
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access
Abstract—The high density of WiFi Access Points and large unlicensed RF bandwidth over which they operate makes them good candidates to alleviate cellular network’s limitations...
Tao Jin, Guevara Noubir, Bo Sheng
ACSAC
2010
IEEE
12 years 11 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
CORR
2011
Springer
178views Education» more  CORR 2011»
12 years 11 months ago
Online Learning: Stochastic and Constrained Adversaries
Learning theory has largely focused on two main learning scenarios. The first is the classical statistical setting where instances are drawn i.i.d. from a fixed distribution and...
Alexander Rakhlin, Karthik Sridharan, Ambuj Tewari
HPCA
2011
IEEE
12 years 11 months ago
MOPED: Orchestrating interprocess message data on CMPs
Future CMPs will combine many simple cores with deep cache hierarchies. With more cores, cache resources per core are fewer, and must be shared carefully to avoid poor utilization...
Junli Gu, Steven S. Lumetta, Rakesh Kumar, Yihe Su...