Sciweavers

522 search results - page 81 / 105
» What's a Typical Commit
Sort
View
SYNTHESE
2010
157views more  SYNTHESE 2010»
13 years 6 months ago
Which empathy? Limitations in the mirrored "understanding" of emotion
The recent discovery of so-called “mirror-neurons” in monkeys and a corresponding mirroring “system” in humans has provoked wide endorsement of the claim that humans under...
Remy Debes
TVCG
2010
165views more  TVCG 2010»
13 years 6 months ago
A Visual Backchannel for Large-Scale Events
—We introduce the concept of a Visual Backchannel as a novel way of following and exploring online conversations about large-scale events. Microblogging communities, such as Twit...
Marian Dörk, Daniel M. Gruen, Carey Williamso...
CCS
2011
ACM
12 years 7 months ago
BitShred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This growth has created a need for automatic malware triage techniques that determine what malwar...
Jiyong Jang, David Brumley, Shobha Venkataraman
PODS
2012
ACM
240views Database» more  PODS 2012»
11 years 10 months ago
Approximate computation and implicit regularization for very large-scale data analysis
Database theory and database practice are typically the domain of computer scientists who adopt what may be termed an algorithmic perspective on their data. This perspective is ve...
Michael W. Mahoney
ESORICS
2003
Springer
14 years 26 days ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner