Sciweavers

3238 search results - page 42 / 648
» Not Enough Points Is Enough
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
Bias and the limits of pooling
Modern retrieval test collections are built through a process called pooling in which only a sample of the entire document set is judged for each topic. The idea behind pooling is...
Chris Buckley, Darrin Dimmick, Ian Soboroff, Ellen...
VALUETOOLS
2006
ACM
128views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Relative stability analysis of multiple queues
In this paper we consider a general class of single-server multiqueue systems in which the stability of any single queue can be essentially determined by the queue’s arrival rat...
Sum Lam, Rocky K. C. Chang, Yi Xie
ICPADS
2005
IEEE
14 years 1 months ago
A Parallel Implementation of 2-D/3-D Image Registration for Computer-Assisted Surgery
: Image registration is a technique usually used for aligning two different images taken at different times and/or from different viewing points. A key challenge for medical image ...
Fumihiko Ino, Yasuhiro Kawasaki, Takahito Tashiro,...
NDSS
2005
IEEE
14 years 1 months ago
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Xiapu Luo, Rocky K. C. Chang
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung