Sciweavers

570 search results - page 109 / 114
» When does Co-training Work in Real Data
Sort
View
115
Voted
AINA
2010
IEEE
15 years 8 months ago
Encoding and Compression for the Devices Profile for Web Services
—Most solutions for Wireless Sensor Networks (WSN) come equipped with their own architectural concepts which raise the problem of possible incompatibility of computer networks an...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...
132
Voted
CCS
2006
ACM
15 years 7 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
113
Voted
ICSE
2000
IEEE-ACM
15 years 7 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
154
Voted
EFDBS
2000
15 years 5 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
SOSP
1997
ACM
15 years 5 months ago
Cashmere-2L: Software Coherent Shared Memory on a Clustered Remote-Write Network
Low-latency remote-write networks, such as DEC’s Memory Channel, provide the possibility of transparent, inexpensive, large-scale shared-memory parallel computing on clusters of...
Robert Stets, Sandhya Dwarkadas, Nikos Hardavellas...