• Login
    Search 
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 31-40 of 238

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Active Learning Literature Survey 

    Settles, Burr (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    The key idea behind active learning is that a machine learning algorithm can achieve greater accuracy with fewer labeled training instances if it is allowed to choose the training data from which is learns. An active learner ...
    Thumbnail

    Approximating Streaming Window Joins Under CPU Limitations 

    Ayad, Ahmed; Naughton, Jeffrey; Wright, Stephen; Srivastava, Utkarsh (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Data streaming systems face the possibility of having to shed load in the case of CPU or memory resource limitations. In this paper, we study the CPU limited scenario in detail. First, we propose a new model for the CPU ...
    Thumbnail

    Retrofitting Legacy Code for Authorization Policy Enforcement 

    Ganapathy, Vinod; Jaeger, Trent; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Researchers have long argued that the best way to construct a secure system is to proactively integrate security into the design of the system. However, this tenet is rarely followed because of economic and practical ...
    Thumbnail

    On Effective Model-Based Intrusion Detection 

    Giffin, Jonathon; Jha, Somesh; Miller, Barton P. (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Model-based intrusion detectors restrict program execution to a previously computed model of expected behavior. We consider two classes of attacks against these systems: bypass attacks that evade detection by avoiding the ...
    Thumbnail

    RouteBazaar: An Economic Framework for Flexible Routing 

    Esquivel, Holly; Muthukrishnan, Chitra; Niu, Feng; Chawla, Shuchi; Akella, Aditya (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    The Internet?s routing protocol provides users a single end-to-end route that is not guaranteed to be available or to meet user requirements. Our paper addresses this rigidity using an economically grounded approach that ...
    Thumbnail

    Physically-based Animation Rendering with Markov Chain Monte Carlo 

    Lai, Yu-Chi; Liu, Feng; Dyer, Charles (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    Exploring temporal coherence among light transport paths is very important to remove temporally perception-sensitive artifacts in animation rendering. Using the contribution of a light transport path to all frames in an ...
    Thumbnail

    Live Update for Device Drivers 

    Swift, Michael M.; Martin-Guillerez, Damien; Annamalai, Muthukaruppan; Bershad, Brian N.; Levy, Henry M. (University of Wisconsin-Madison Department of Computer Sciences, 2008)
    As commodity operating systems become more reliable and fault-tolerant, the availability of a system will be determined not by when it crashes, but instead by when it must be shutdown and rebooted due to software ...
    Thumbnail

    Database Support for Matching: Limitations and Opportunities 

    Kini, Ameet; Shankar, Srinath; DeWitt, David; Naughton, Jeffrey (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    A match join of R and S with predicate theta is a subset of the theta join of R and S such that each tuple of R and S contributes to at most one result tuple. Match joins and their generalizations arise in many scenarios, ...
    Thumbnail

    Detecting Collisions in Graph-Driven Motion Synthesis 

    Sung, Mankyu; Chenney, Stephen; Gleicher, Michael (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    In this paper we consider detecting collisions between characters whose motion is specified by motion capture data. We consider rough collisions, modeling the characters as a disk in the floor plane. To provide efficient ...
    Thumbnail

    Source-Aware Entity Matching: A Compositional Approach 

    Shen, Warren; DeRose, Pedro; Vu, Long; Doan, AnHai; Ramakrishnan, Raghu (University of Wisconsin-Madison Department of Computer Sciences, 2006)
    Entity matching (a.k.a. record linkage) plays a crucial role in integrating multiple data sources, and numerous matching solutions have been developed. However, the solutions have largely exploited only information available ...
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • . . .
    • 24

    Contact Us | Send Feedback
     

     

    Browse

    All of MINDS@UWCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    AuthorReps, Thomas (29)Jha, Somesh (19)Arpaci-Dusseau, Remzi (17)Arpaci-Dusseau, Andrea (16)Barford, Paul (16)Akella, Aditya (13)Dyer, Charles (13)Livny, Miron (13)Lal, Akash (12)Banerjee, Suman (10)... View MoreDate Issued2007 (39)2006 (32)2003 (29)2005 (26)2004 (25)2002 (24)2008 (20)2009 (19)2000 (14)2001 (10)Has File(s)Yes (238)

    Contact Us | Send Feedback