Sciweavers

4944 search results - page 967 / 989
» From XML to Relational Models
Sort
View
127
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Temporal distance metrics for social network analysis
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
135
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ICRA
2008
IEEE
127views Robotics» more  ICRA 2008»
15 years 10 months ago
New framework for Simultaneous Localization and Mapping: Multi map SLAM
—The main contribution of this paper arises from the development of a new framework, which has its inspiration in the mechanics of human navigation, for solving the problem of Si...
Damith Chandana Herath, Sarath Kodagoda, Gamini Di...
132
Voted
IPPS
2008
IEEE
15 years 10 months ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...
ISPASS
2008
IEEE
15 years 10 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg