Sciweavers

2702 search results - page 462 / 541
» Message from the Editor
Sort
View
ICPADS
2010
IEEE
15 years 1 months ago
Effective Performance Measurement at Petascale Using IPM
As supercomputers are being built from an ever increasing number of processing elements, the effort required to achieve a substantial fraction of the system peak performance is con...
Karl Fürlinger, Nicholas J. Wright, David Ski...
148
Voted
IH
2010
Springer
15 years 1 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
OPODIS
2010
15 years 1 months ago
Failure Detectors Encapsulate Fairness
Failure detectors are commonly viewed as abstractions for the synchronism present in distributed system models. However, investigations into the exact amount of synchronism encapsu...
Scott M. Pike, Srikanth Sastry, Jennifer L. Welch
EDM
2009
120views Data Mining» more  EDM 2009»
15 years 1 months ago
Improving Student Question Classification
Students in introductory programming classes often articulate their questions and information needs incompletely. Consequently, the automatic classification of student questions to...
Cecily Heiner, Joseph L. Zachary
ICASSP
2009
IEEE
15 years 1 months ago
Fixed SINR solutions for the MIMO wiretap channel
This paper studies the use of artificial interference in reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdro...
A. Lee Swindlehurst