Sciweavers

817 search results - page 158 / 164
» Malware behaviour analysis
Sort
View
SIGECOM
2011
ACM
219views ECommerce» more  SIGECOM 2011»
12 years 10 months ago
GSP auctions with correlated types
The Generalized Second Price (GSP) auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction in the Bayesian settin...
Brendan Lucier, Renato Paes Leme
CHI
2009
ACM
14 years 8 months ago
soft(n): toward a somaesthetics of touch
This paper explores the concept of somaesthetics as an approach to the design of expressive interaction. This concept is exemplified through the design process of soft(n), an inte...
Thecla Schiphorst
RECOMB
2010
Springer
14 years 2 months ago
Genomic DNA k-mer Spectra: Models and Modalities
Background: The empirical frequencies of DNA k-mers in whole genome sequences provide an interesting perspective on genomic complexity, and the availability of large segments of g...
Benny Chor, David Horn, Nick Goldman, Yaron Levy, ...
AINA
2009
IEEE
14 years 2 months ago
Predictive Simulation of HPC Applications
The architectures which support modern supercomputing machinery are as diverse today, as at any point during the last twenty years. The variety of processor core arrangements, thr...
Simon D. Hammond, J. A. Smith, Gihan R. Mudalige, ...
ATAL
2009
Springer
14 years 1 months ago
False name manipulations in weighted voting games: splitting, merging and annexation
An important aspect of mechanism design in social choice protocols and multiagent systems is to discourage insincere and manipulative behaviour. We examine the computational compl...
Haris Aziz, Mike Paterson