Sciweavers

1061 search results - page 121 / 213
» Experiences with Honeypot Systems: Development, Deployment, ...
Sort
View
COMPSAC
2008
IEEE
14 years 3 months ago
Ontology Model-Based Static Analysis on Java Programs
1 Typical enterprise and military software systems consist of millions of lines of code with complicated dependence on library abstractions. Manually debugging these codes imposes ...
Lian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang
TSMC
2008
182views more  TSMC 2008»
13 years 8 months ago
Incremental Linear Discriminant Analysis for Face Recognition
Abstract--Dimensionality reduction methods have been successfully employed for face recognition. Among the various dimensionality reduction algorithms, linear (Fisher) discriminant...
Haitao Zhao, Pong Chi Yuen
ICSM
2008
IEEE
14 years 3 months ago
Who can help me with this source code change?
An approach to recommend a ranked list of developers to assist in performing software changes to a particular file is presented. The ranking is based on change expertise, experien...
Huzefa H. Kagdi, Maen Hammad, Jonathan I. Maletic
CIKM
2004
Springer
14 years 2 months ago
RStar: an RDF storage and query system for enterprise resource management
Modern corporations operate in an extremely complex environment and strongly depend on all kinds of information resources across the enterprise. Unfortunately, with the growth of ...
Li Ma, Zhong Su, Yue Pan, Li Zhang, Tao Liu
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 3 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...