Sciweavers

16093 search results - page 3170 / 3219
» On the optimality of the neighbor-joining algorithm
Sort
View
SIGIR
2004
ACM
14 years 1 months ago
An automatic weighting scheme for collaborative filtering
Collaborative filtering identifies information interest of a particular user based on the information provided by other similar users. The memory-based approaches for collaborativ...
Rong Jin, Joyce Y. Chai, Luo Si
SIGOPSE
2004
ACM
14 years 1 months ago
Defending against eclipse attacks on overlay networks
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
Atul Singh, Miguel Castro, Peter Druschel, Antony ...
VRML
2004
ACM
14 years 1 months ago
PathSim visualizer: an Information-Rich Virtual Environment framework for systems biology
Increasingly, biology researchers and medical practitioners are using computational tools to model and analyze dynamic systems across scales from the macro to the cellular to the ...
Nicholas F. Polys, Doug A. Bowman, Chris North, Re...
COCO
2004
Springer
82views Algorithms» more  COCO 2004»
14 years 1 months ago
Dimension, Entropy Rates, and Compression
This paper develops new relationships between resource-bounded dimension, entropy rates, and compression. New tools for calculating dimensions are given and used to improve previo...
John M. Hitchcock, N. V. Vinodchandran
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
14 years 1 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
« Prev « First page 3170 / 3219 Last » Next »