Sciweavers

5410 search results - page 59 / 1082
» When to Cross Over
Sort
View
TREC
2000
13 years 10 months ago
TREC-9 Cross Language, Web and Question-Answering Track Experiments using PIRCS
In TREC-9, we participated in the English-Chinese Cross Language, 10GB Web data ad-hoc retrieval as well as the Question-Answering tracks, all using automatic procedures. All thes...
Kui-Lam Kwok, Laszlo Grunfeld, Norbert Dinstl, M. ...
DIMVA
2006
13 years 10 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
ICNP
2007
IEEE
14 years 3 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
14 years 9 months ago
Cross domain distribution adaptation via kernel mapping
When labeled examples are limited and difficult to obtain, transfer learning employs knowledge from a source domain to improve learning accuracy in the target domain. However, the...
ErHeng Zhong, Wei Fan, Jing Peng, Kun Zhang, Jiang...
INFOCOM
2007
IEEE
14 years 3 months ago
A Cross-Layer Architecture to Exploit Multi-Channel Diversity with a Single Transceiver
—The design of multi-channel multi-hop wireless mesh networks is centered around the way nodes synchronize when they need to communicate. However, existing designs are confined ...
Jay A. Patel, Haiyun Luo, Indranil Gupta