Sciweavers

2515 search results - page 486 / 503
» Interval Availability Distribution Computation
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 10 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ATAL
2006
Springer
13 years 10 months ago
A utility-based sensing and communication model for a glacial sensor network
This paper reports on the development of a utility-based mechanism for managing sensing and communication in cooperative multi-sensor networks. The specific application considered...
Paritosh Padhy, Rajdeep K. Dash, Kirk Martinez, Ni...
EUROSSC
2006
Springer
13 years 10 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
ASPLOS
2008
ACM
13 years 8 months ago
Merge: a programming model for heterogeneous multi-core systems
In this paper we propose the Merge framework, a general purpose programming model for heterogeneous multi-core systems. The Merge framework replaces current ad hoc approaches to p...
Michael D. Linderman, Jamison D. Collins, Hong Wan...
CIVR
2008
Springer
239views Image Analysis» more  CIVR 2008»
13 years 8 months ago
Analyzing Flickr groups
There is an explosion of community-generated multimedia content available online. In particular, Flickr constitutes a 200-million photo sharing system where users participate foll...
Radu Andrei Negoescu, Daniel Gatica-Perez