Sciweavers

49 search results - page 8 / 10
» Uniform metrical task systems with a limited number of state...
Sort
View
WSNA
2003
ACM
14 years 25 days ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
TKDD
2010
121views more  TKDD 2010»
13 years 6 months ago
Factor in the neighbors: Scalable and accurate collaborative filtering
Recommender systems provide users with personalized suggestions for products or services. These systems often rely on Collaborating Filtering (CF), where past transactions are ana...
Yehuda Koren
SIGCOMM
2006
ACM
14 years 1 months ago
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patr...
WWW
2009
ACM
14 years 8 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...
NPL
2007
109views more  NPL 2007»
13 years 7 months ago
Generative Modeling of Autonomous Robots and their Environments using Reservoir Computing
Autonomous mobile robots form an important research topic in the field of robotics due to their near-term applicability in the real world as domestic service robots. These robots ...
Eric A. Antonelo, Benjamin Schrauwen, Jan M. Van C...