Sciweavers

1599 search results - page 274 / 320
» Probabilistic Analysis of Anonymity
Sort
View
119
Voted
ESWS
2010
Springer
15 years 7 months ago
Efficient Semantic-Aware Detection of Near Duplicate Resources
Abstract. Efficiently detecting near duplicate resources is an important task when integrating information from various sources and applications. Once detected, near duplicate reso...
Ekaterini Ioannou, Odysseas Papapetrou, Dimitrios ...
NSDI
2007
15 years 6 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...
135
Voted
ASPDAC
2008
ACM
174views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Chebyshev Affine Arithmetic based parametric yield prediction under limited descriptions of uncertainty
In modern circuit design, it is difficult to provide reliable parametric yield prediction since the real distribution of process data is hard to measure. Most existing approaches ...
Jin Sun, Yue Huang, Jun Li, Janet Meiling Wang
130
Voted
CIKM
2008
Springer
15 years 5 months ago
Combining concept hierarchies and statistical topic models
Statistical topic models provide a general data-driven framework for automated discovery of high-level knowledge from large collections of text documents. While topic models can p...
Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyv...
159
Voted
DSN
2005
IEEE
15 years 5 months ago
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors
Soft errors are a growing concern for processor reliability. Recent work has motivated architecture-level studies of soft errors since the architecture can mask many raw errors an...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...