Sciweavers

185 search results - page 34 / 37
» A metric approach toward point process divergence
Sort
View
P2P
2006
IEEE
211views Communications» more  P2P 2006»
14 years 1 months ago
Comparison of Image Similarity Queries in P2P Systems
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured querie...
Wolfgang Müller 0002, P. Oscar Boykin, Nima S...
SIGMETRICS
2010
ACM
143views Hardware» more  SIGMETRICS 2010»
14 years 22 days ago
Practical performance models for complex, popular applications
Perhaps surprisingly, no practical performance models exist for popular (and complex) client applications such as Adobe’s Creative Suite, Microsoft’s Office and Visual Studio...
Eno Thereska, Bjoern Doebel, Alice X. Zheng, Peter...
ICSE
2001
IEEE-ACM
14 years 11 days ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
CGF
2010
161views more  CGF 2010»
13 years 8 months ago
HyperMoVal: Interactive Visual Validation of Regression Models for Real-Time Simulation
During the development of car engines, regression models that are based on machine learning techniques are increasingly important for tasks which require a prediction of results i...
Harald Piringer, Wolfgang Berger, J. Krasser
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...