Sciweavers

12863 search results - page 2570 / 2573
» Dynamic Data Mining
Sort
View
BIRTHDAY
2011
Springer
12 years 7 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
POPL
2012
ACM
12 years 3 months ago
A compiler and run-time system for network programming languages
Software-defined networks (SDNs) are a new implementation architecture in which a controller machine manages a distributed collection of switches, by instructing them to install ...
Christopher Monsanto, Nate Foster, Rob Harrison, D...
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ICDE
2012
IEEE
205views Database» more  ICDE 2012»
11 years 10 months ago
Optimizing Statistical Information Extraction Programs over Evolving Text
—Statistical information extraction (IE) programs are increasingly used to build real-world IE systems such as Alibaba, CiteSeer, Kylin, and YAGO. Current statistical IE approach...
Fei Chen, Xixuan Feng, Christopher Re, Min Wang
INFOCOM
2012
IEEE
11 years 10 months ago
L2P2: Location-aware location privacy protection for location-based services
Abstract—Location privacy has been a serious concern for mobile users who use location-based services provided by the thirdparty provider via mobile networks. Recently, there hav...
Yu Wang 0003, Dingbang Xu, Xiao He, Chao Zhang, Fa...
« Prev « First page 2570 / 2573 Last » Next »