Sciweavers

732 search results - page 119 / 147
» Strongly Non-U-Shaped Learning Results by General Techniques
Sort
View
STOC
2004
ACM
134views Algorithms» more  STOC 2004»
14 years 10 months ago
Better extractors for better codes?
We present an explicit construction of codes that can be list decoded from a fraction (1 - ) of errors in sub-exponential time and which have rate / logO(1) (1/). This comes close...
Venkatesan Guruswami
SIGCOMM
2009
ACM
14 years 4 months ago
GrassRoots: socially-driven web sites for the masses
Large, socially-driven Web 2.0 sites such as Facebook and Youtube have seen significant growth in popularity [5, 10]. However, strong demand also exists for socially-driven web s...
Frank Uyeda, Diwaker Gupta, Amin Vahdat, George Va...
VEE
2006
ACM
155views Virtualization» more  VEE 2006»
14 years 4 months ago
A feather-weight virtual machine for windows applications
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam,...
MMMACNS
2005
Springer
14 years 3 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
PLDI
2004
ACM
14 years 3 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam