Sciweavers

13593 search results - page 2714 / 2719
» Performance Analysis of MD5
Sort
View
SIGMETRICS
2011
ACM
296views Hardware» more  SIGMETRICS 2011»
13 years 18 days ago
Cellular data network infrastructure characterization and implication on mobile content placement
Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure o...
Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian...
SIGMOD
2011
ACM
210views Database» more  SIGMOD 2011»
13 years 18 days ago
A platform for scalable one-pass analytics using MapReduce
Today’s one-pass analytics applications tend to be data-intensive in nature and require the ability to process high volumes of data efficiently. MapReduce is a popular programm...
Boduo Li, Edward Mazur, Yanlei Diao, Andrew McGreg...
ICCV
2011
IEEE
12 years 9 months ago
iGroup : Weakly supervised image and video grouping
We present a generic, efficient and iterative algorithm for interactively clustering classes of images and videos. The approach moves away from the use of large hand labelled tra...
Andrew Gilbert, Richard Bowden
ATAL
2011
Springer
12 years 9 months ago
Incentive design for adaptive agents
We consider a setting in which a principal seeks to induce an adaptive agent to select a target action by providing incentives on one or more actions. The agent maintains a belief...
Yiling Chen, Jerry Kung, David C. Parkes, Ariel D....
CCS
2011
ACM
12 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
« Prev « First page 2714 / 2719 Last » Next »