Sciweavers

5267 search results - page 983 / 1054
» Methods for Knowledge Based Controlling of Distributed Syste...
Sort
View
IMC
2010
ACM
15 years 7 days ago
YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective
In this paper we conduct an extensive and in-depth study of traffic exchanged between YouTube data centers and its users, as seen from the perspective of a tier-1 ISP in Spring 20...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
152
Voted
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 2 months ago
Learning optimal ranking with tensor factorization for tag recommendation
Tag recommendation is the task of predicting a personalized list of tags for a user given an item. This is important for many websites with tagging capabilities like last.fm or de...
Steffen Rendle, Leandro Balby Marinho, Alexandros ...
BMCBI
2005
212views more  BMCBI 2005»
15 years 2 months ago
PAGE: Parametric Analysis of Gene Set Enrichment
Background: Gene set enrichment analysis (GSEA) is a microarray data analysis method that uses predefined gene sets and ranks of genes to identify significant biological changes i...
Seon-Young Kim, David J. Volsky
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 2 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic
AFRICACRYPT
2009
Springer
15 years 9 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...