Sciweavers

444 search results - page 26 / 89
» Performance Analysis of Peer-to-Peer Storage Systems
Sort
View
CN
2007
133views more  CN 2007»
13 years 7 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
MM
2003
ACM
94views Multimedia» more  MM 2003»
14 years 26 days ago
The video paper multimedia playback system
Video Paper is a prototype system for multimedia browsing, analysis, and replay. Key frames extracted from a video recording are printed on paper together with bar codes that allo...
Jamey Graham, Berna Erol, Jonathan J. Hull, Dar-Sh...
SIGIR
2009
ACM
14 years 2 months ago
A comparison of retrieval-based hierarchical clustering approaches to person name disambiguation
This paper describes a simple clustering approach to person name disambiguation of retrieved documents. The methods are based on standard IR concepts and do not require any task-s...
Christof Monz, Wouter Weerkamp
CLEF
2006
Springer
13 years 11 months ago
The Bilingual System MUSCLEF at QA@CLEF 2006
This paper presents our bilingual question-answering system MUSCLEF. We underline the difficulties encountered when shifting from a mono to a cross-lingual system, then we focus o...
Brigitte Grau, Anne-Laure Ligozat, Isabelle Robba,...
RECSYS
2009
ACM
14 years 8 days ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley