Sciweavers

15379 search results - page 2918 / 3076
» Protecting users from
Sort
View
CHI
2009
ACM
16 years 4 months ago
Remote impact: shadowboxing over a distance
Florian `Floyd' Mueller Distance Lab Horizon Scotland The Enterprise Park Forres, Moray IV36 2AB UK floyd@exertioninterfaces.com Stefan Agamanolis Distance Lab Horizon Scotlan...
Florian Mueller, Stefan Agamanolis, Martin R. Gibb...
EUROCRYPT
2009
Springer
16 years 4 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
PPOPP
2009
ACM
16 years 4 months ago
Effective performance measurement and analysis of multithreaded applications
Understanding why the performance of a multithreaded program does not improve linearly with the number of cores in a sharedmemory node populated with one or more multicore process...
Nathan R. Tallent, John M. Mellor-Crummey
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 4 months ago
Learning optimal ranking with tensor factorization for tag recommendation
Tag recommendation is the task of predicting a personalized list of tags for a user given an item. This is important for many websites with tagging capabilities like last.fm or de...
Steffen Rendle, Leandro Balby Marinho, Alexandros ...
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
16 years 4 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
« Prev « First page 2918 / 3076 Last » Next »