Search
Now showing items 11-20 of 26
Improving Privacy And Performance In Anonymous Communications
(Computer Science & Engineering, 2011-03-03)
Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and ...
Typifying Wikipedia Articles
(Computer Science & Engineering, 2011-03-03)
In Wikipedia, each article represents an entity. Entity can have different types like person, country, school, science etc. Although Wikipedia encapsulates category information for each page, sometimes it is not sufficient ...
A Holistic, Similarity-based Approach For Personalized Ranking In Web Databases
(Computer Science & Engineering, 2011-10-11)
With the advent of the Web, the notion of ``information retrieval'' has acquired a completely new connotation and currently encompasses several disciplines ranging from traditional forms of text and data retrieval in ...
Recommender Systems: An Algorithm To Predict "Who Rate What"
(Computer Science & Engineering, 2011-03-03)
Recommender systems are systems that recommend content for us by looking at certain factors including what other people are doing as well as what we are doing. Examples of such systems present today are Amazon.com recommending ...
Performance Analysis And Resource Allocation For Multithreaded Multicore Processors
(Computer Science & Engineering, 2011-10-11)
With ever expanding design space and workload space in multicore era, a key challenge to program a multithreaded multicore processor is how to evaluate the performance of various possible program-task-to-core mapping choices ...
Generalized Reinforcement Learning With An Application In Generic Workload Management Systems
(Computer Science & Engineering, 2011-10-11)
Learning by trial and error and being able to form levels of abstraction from the past experience has been an important factor for sentient beings to develop intelligent behaviors and cope with an ever-changing environment. ...
Delay Tolerant Lazy Release Consistency For Distributed Shared Memory In Opportunistic Networks
(Computer Science & Engineering, 2011-10-11)
Opportunistic networking (ON), a concept which allows a mobile wireless device to dynamically interact with other wireless devices in its immediate vicinity, is a field with great potential to improve the utility of itinerant ...
Reinforcement Learning Based Strategies For Adaptive Wireless Sensor Network Management
(Computer Science & Engineering, 2011-03-03)
In wireless sensor networks (WSN), resource-constrained nodes are expected to operate in highly dynamic and often unattended environments. WSN applications need to cope with such dynamicity and uncertainty intrinsic in ...
Distributed Services In Pervasive Systems
(Computer Science & Engineering, 2011-03-03)
Devices in pervasive systems are generally resource constrained, heterogeneous, personal, and mobile. These constraints limit the services and quality of service offered by the devices. For example, execution of such tasks ...
Episodic Task Planning And Learning In Pervasive Environments
(Computer Science & Engineering, 2011-03-03)
During planning and control of autonomous robots in a pervasive environment designed to serve people, we will inevitably face the situations of needing to perform multiple complex tasks. Management and optimization of the ...