Sciweavers

11376 search results - page 67 / 2276
» Willow System Demonstration
Sort
View
159
Voted
CORR
2011
Springer
144views Education» more  CORR 2011»
14 years 11 months ago
Schema Redescription in Cellular Automata: Revisiting Emergence in Complex Systems
—We present a method to eliminate redundancy in the transition tables of Boolean automata: schema redescription with two symbols. One symbol is used to capture redundancy of indi...
Manuel Marques-Pita, Luis Mateus Rocha
ITIIS
2010
130views more  ITIIS 2010»
14 years 11 months ago
A Novel System for Detecting Adult Images on the Internet
As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessi...
Jae-Yong Park, Sang-Sung Park, Young-Geun Shin, Do...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
239
Voted
DEBU
2011
14 years 8 months ago
Integrating Renewable Energy Using Data Analytics Systems: Challenges and Opportunities
The variable and intermittent nature of many renewable energy sources makes integrating them into the electric grid challenging and limits their penetration. The current grid requ...
Andrew Krioukov, Christoph Goebel, Sara Alspaugh, ...
155
Voted
AAAI
2012
13 years 7 months ago
A Sequential Decision Approach to Ordinal Preferences in Recommender Systems
We propose a novel sequential decision approach to modeling ordinal ratings in collaborative filtering problems. The rating process is assumed to start from the lowest level, eva...
Truyen Tran, Dinh Q. Phung, Svetha Venkatesh