Sciweavers

2250 search results - page 353 / 450
» Authorizing applications in singularity
Sort
View
184
Voted
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 11 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 11 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...
COMPSAC
2009
IEEE
15 years 11 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
IDEAS
2009
IEEE
111views Database» more  IDEAS 2009»
15 years 11 months ago
Semantics of a runtime adaptable transaction manager
Database Management Systems (DBMSs) that can be tailored to specific requirements offer the potential to improve reliability and maintainability and simultaneously the ability t...
Florian Irmert, Frank Lauterwald, Christoph P. Neu...
MLDM
2009
Springer
15 years 11 months ago
Memory-Based Modeling of Seasonality for Prediction of Climatic Time Series
The paper describes a method for predicting climate time series that consist of significant annual and diurnal seasonal components and a short-term stockastic component. A memory...
Daniel Nikovski, Ganesan Ramachandran