Sciweavers

6109 search results - page 1148 / 1222
» Ubiquitous Web Applications
Sort
View
131
Voted
EUROSYS
2008
ACM
16 years 23 days ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
118
Voted
CVPR
2010
IEEE
16 years 4 days ago
Unsupervised Learning of Invariant Features Using Video
We present an algorithm that learns invariant features from real data in an entirely unsupervised fashion. The principal benefit of our method is that it can be applied without hu...
David Stavens, Sebastian Thrun
156
Voted
SAC
2009
ACM
15 years 10 months ago
Points-to analysis for JavaScript
JavaScript is widely used by web developers and the complexity of JavaScript programs has increased over the last year. Therefore, the need for program analysis for JavaScript is ...
Dongseok Jang, Kwang-Moo Choe
142
Voted
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
15 years 10 months ago
A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks
This paper offers a local distributed algorithm for expectation maximization in large peer-to-peer environments. The algorithm can be used for a variety of well-known data mining...
Kanishka Bhaduri, Ashok N. Srivastava
125
Voted
IEEECIT
2009
IEEE
15 years 10 months ago
A Highly Efficient Inter-domain Communication Channel
—With virtual machine technology, distributed services deployed in multiple cooperative virtual machines, such as multi-tier web services, may reside on one physical machine. Thi...
Hongyong Zang, Kuiyan Gu, Yaqiong Li, Yuzhong Sun,...
« Prev « First page 1148 / 1222 Last » Next »