Sciweavers

11949 search results - page 2382 / 2390
» Some results on (a:b)-choosability
Sort
View
SODA
2012
ACM
240views Algorithms» more  SODA 2012»
11 years 9 months ago
Simultaneous approximations for adversarial and stochastic online budgeted allocation
Motivated by online ad allocation, we study the problem of simultaneous approximations for the adversarial and stochastic online budgeted allocation problem. This problem consists...
Vahab S. Mirrokni, Shayan Oveis Gharan, Morteza Za...
CVPR
2012
IEEE
11 years 9 months ago
Classifying covert photographs
The advances in image acquisition techniques make recording images never easier and brings a great convenience to our daily life. It raises at the same time the issue of privacy p...
Haitao Lang, Haibin Ling
ISCA
2012
IEEE
333views Hardware» more  ISCA 2012»
11 years 9 months ago
Reducing memory reference energy with opportunistic virtual caching
Most modern cores perform a highly-associative translation look aside buffer (TLB) lookup on every memory access. These designs often hide the TLB lookup latency by overlapping it...
Arkaprava Basu, Mark D. Hill, Michael M. Swift
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
11 years 9 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
ACL
2012
11 years 9 months ago
Finding Bursty Topics from Microblogs
Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Al...
Qiming Diao, Jing Jiang, Feida Zhu, Ee-Peng Lim
« Prev « First page 2382 / 2390 Last » Next »