Sciweavers

698 search results - page 15 / 140
» Evaluating Key Statements Analysis
Sort
View
SCAM
2007
IEEE
14 years 4 months ago
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
Eva Magnusson, Torbjörn Ekman, Görel Hed...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
CIKM
2009
Springer
14 years 1 months ago
Multidimensional political spectrum identification and analysis
In this work, we show the importance of multidimensional opinion representation in the political context combining domain knowledge and results from principal component analysis. ...
Leilei Zhu, Prasenjit Mitra
IJCSA
2006
121views more  IJCSA 2006»
13 years 9 months ago
Evaluation of the RC4 Algorithm for Data Encryption
Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm...
Allam Mousa, Ahmad Hamad
ICDAR
2009
IEEE
14 years 4 months ago
Results of the RIMES Evaluation Campaign for Handwritten Mail Processing
This paper presents the results of the second test phase of the RIMES1 evaluation campaign. The latter is the first large-scale evaluation campaign intended to all the key players...
Emmanuele Grosicki, Matthieu Carré, Jean-Ma...