Sciweavers

11740 search results - page 2216 / 2348
» More Problems in Rewriting
Sort
View
CLUSTER
2007
IEEE
14 years 1 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
PET
2010
Springer
14 years 1 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
ELPUB
2007
ACM
14 years 29 days ago
Automatic Sentiment Analysis in On-line Text
The growing stream of content placed on the Web provides a huge collection of textual resources. People share their experiences on-line, ventilate their opinions (and frustrations...
Erik Boiy, Pieter Hens, Koen Deschacht, Marie-Fran...
ICDCS
2010
IEEE
14 years 29 days ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
14 years 28 days ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
« Prev « First page 2216 / 2348 Last » Next »