Sciweavers

515 search results - page 35 / 103
» A Strategy for Information Source Identification
Sort
View
124
Voted
AUSFORENSICS
2003
15 years 4 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
117
Voted
IWPC
2009
IEEE
15 years 10 months ago
Who can help me with this change request?
An approach to recommend a ranked list of developers to assist in performing software changes given a textual change request is presented. The approach employs a two-fold strategy...
Huzefa H. Kagdi, Denys Poshyvanyk
100
Voted
ESA
2009
Springer
98views Algorithms» more  ESA 2009»
15 years 10 months ago
The Oil Searching Problem
Given n potential oil locations, where each has oil at a certain depth, we seek good trade-offs between the number of oil sources found and the total amount of drilling performed. ...
Andrew McGregor, Krzysztof Onak, Rina Panigrahy
127
Voted
DOCENG
2008
ACM
15 years 5 months ago
An exploratory mapping strategy for web-driven magazines
"There will always (I hope) be print books, but just as the advent of photography changed the role of painting or film changed the role of theater in our culture, electronic ...
Fabio Giannetti
155
Voted
CIKM
2004
Springer
15 years 7 months ago
Restructuring batch view maintenance efficiently
Materialized views defined over distributed data sources are a well recognized technology for modern applications. Stateof-the-art incremental view maintenance requires O(n2 ) or ...
Bin Liu, Elke A. Rundensteiner, David Finkel