Sciweavers

13987 search results - page 2678 / 2798
» The Two Guards Problem
Sort
View
127
Voted
CCS
2008
ACM
15 years 4 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
116
Voted
CEAS
2008
Springer
15 years 4 months ago
Tracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Ka...
100
Voted
CIKM
2008
Springer
15 years 4 months ago
Topic models and a revisit of text-related applications
Topic models such as aspect model or LDA have been shown as a promising approach for text modeling. Unlike many previous models that restrict each document to a single topic, topi...
Viet Ha-Thuc, Padmini Srinivasan
128
Voted
CIKM
2008
Springer
15 years 4 months ago
Peer-to-peer similarity search over widely distributed document collections
This paper addresses the challenging problem of similarity search over widely distributed ultra-high dimensional data. Such an application is retrieval of the top-k most similar d...
Christos Doulkeridis, Kjetil Nørvåg, ...
132
Voted
CASES
2005
ACM
15 years 4 months ago
Architectural support for real-time task scheduling in SMT processors
In Simultaneous Multithreaded (SMT) architectures most hardware resources are shared between threads. This provides a good cost/performance trade-off which renders these architec...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
« Prev « First page 2678 / 2798 Last » Next »