Sciweavers

1998 search results - page 345 / 400
» A Hardware Implementation of PRAM and Its Performance Evalua...
Sort
View
KDD
2008
ACM
192views Data Mining» more  KDD 2008»
14 years 10 months ago
Partial least squares regression for graph mining
Attributed graphs are increasingly more common in many application domains such as chemistry, biology and text processing. A central issue in graph mining is how to collect inform...
Hiroto Saigo, Koji Tsuda, Nicole Krämer
EUROSYS
2009
ACM
14 years 7 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
DSN
2009
IEEE
14 years 4 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
RTAS
2009
IEEE
14 years 4 months ago
QeDB: A Quality-Aware Embedded Real-Time Database
QeDB is a database for data-intensive real-time applications running on flash memory-based embedded systems. Currently, databases for embedded systems are best effort, providing ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic
FGIT
2009
Springer
14 years 4 months ago
AGILE Rate Control for IEEE 802.11 Networks
We present a transmission rate adaptation algorithm called AGILE (ACK-Guided Immediate Link rate Estimation) for IEEE 802.11 networks. The key idea of AGILE is that the transmitter...
Lochan Verma, Seongkwan Kim, Sunghyun Choi, Sung-J...