Sciweavers

1390 search results - page 199 / 278
» Streaming Algorithms Measured in Terms of the Computed Quant...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CCR
2008
75views more  CCR 2008»
13 years 8 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic
ML
2006
ACM
13 years 8 months ago
Relational IBL in classical music
It is well known that many hard tasks considered in machine learning and data mining can be solved in a rather simple and robust way with an instanceand distance-based approach. In...
Asmir Tobudic, Gerhard Widmer
TIP
2002
183views more  TIP 2002»
13 years 8 months ago
Speckle reducing anisotropic diffusion
This paper provides the derivation of speckle reducing anisotropic diffusion (SRAD), a diffusion method tailored to ultrasonic and radar imaging applications. SRAD is the edge-sens...
Yongjian Yu, Scott T. Acton
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 9 months ago
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data
Active and semi-supervised learning are important techniques when labeled data are scarce. Recently a method was suggested for combining active learning with a semi-supervised lea...
Sofus A. Macskassy