Sciweavers

2334 search results - page 182 / 467
» How are Real Grids Used
Sort
View
116
Voted
CSREASAM
2006
15 years 5 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
160
Voted
KDD
2004
ACM
209views Data Mining» more  KDD 2004»
16 years 4 months ago
Tracking dynamics of topic trends using a finite mixture model
In a wide range of business areas dealing with text data streams, including CRM, knowledge management, and Web monitoring services, it is an important issue to discover topic tren...
Satoshi Morinaga, Kenji Yamanishi
167
Voted
ICRA
2010
IEEE
104views Robotics» more  ICRA 2010»
15 years 2 months ago
Using model knowledge for learning inverse dynamics
— In recent years, learning models from data has become an increasingly interesting tool for robotics, as it allows straightforward and accurate model approximation. However, in ...
Duy Nguyen-Tuong, Jan Peters
114
Voted
OOPSLA
2004
Springer
15 years 9 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh
133
Voted
ARCS
2009
Springer
15 years 10 months ago
Evaluating Sampling Based Hotspot Detection
In sampling based hotspot detection, performance engineers sample the running program periodically and record the Instruction Pointer (IP) addresses at the sampling. Empirically, f...
Qiang Wu, Oskar Mencer