Sciweavers

859 search results - page 125 / 172
» Behaviour Analysis of Distributed Systems Using the Tracta A...
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 3 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
ICDAR
2005
IEEE
14 years 2 months ago
Text/Graphic labelling of Ancient Printed Documents
This paper presents a text/graphic labelling for ancient printed documents. Our approach is based on the extraction and the quantification of the various orientations that are pre...
Nicholas Journet, Véronique Eglin, Jean-Yve...
ISMIS
2005
Springer
14 years 2 months ago
Semantic-Based Access to Digital Document Databases
Abstract. Discovering significant meta-information from document collections is a critical factor for knowledge distribution and preservation. This paper presents a system that im...
Floriana Esposito, Stefano Ferilli, Teresa Maria A...
PPAM
2005
Springer
14 years 2 months ago
Parallel Query Processing and Edge Ranking of Graphs
Abstract. In this paper we deal with the problem of finding an optimal query execution plan in database systems. We improve the analysis of a polynomial-time approximation algorit...
Dariusz Dereniowski, Marek Kubale
AINA
2009
IEEE
14 years 3 months ago
Predictive Simulation of HPC Applications
The architectures which support modern supercomputing machinery are as diverse today, as at any point during the last twenty years. The variety of processor core arrangements, thr...
Simon D. Hammond, J. A. Smith, Gihan R. Mudalige, ...