Sciweavers

4307 search results - page 581 / 862
» Dynamic Spyware Analysis
Sort
View
129
Voted
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
16 years 2 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
140
Voted
MM
2006
ACM
203views Multimedia» more  MM 2006»
15 years 8 months ago
Learning image manifolds by semantic subspace projection
In many image retrieval applications, the mapping between highlevel semantic concept and low-level features is obtained through a learning process. Traditional approaches often as...
Jie Yu, Qi Tian
129
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
113
Voted
CODES
2003
IEEE
15 years 8 months ago
Accurate estimation of cache-related preemption delay
Multitasked real-time systems often employ caches to boost performance. However the unpredictable dynamic behavior of caches makes schedulability analysis of such systems difficul...
Hemendra Singh Negi, Tulika Mitra, Abhik Roychoudh...
BIOINFORMATICS
2008
203views more  BIOINFORMATICS 2008»
15 years 2 months ago
The SGN comparative map viewer
Background: A common approach to understanding the genetic basis of complex traits is through identification of associated quantitative trait loci (QTL). Fine mapping QTLs require...
Lukas A. Mueller, Adri A. Mills, Beth Skwarecki, R...