Sciweavers

6153 search results - page 1072 / 1231
» Modeling Cyclic Change
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
ANTSW
2010
Springer
13 years 6 months ago
Functional Blueprints: An Approach to Modularity in Grown Systems
Abstract. The engineering of grown systems poses fundamentally different system integration challenges than ordinary engineering of static designs. On the one hand, a grown system ...
Jacob Beal
APSCC
2010
IEEE
13 years 6 months ago
On Evaluating and Publishing Data Concerns for Data as a Service
Abstract--The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web s...
Hong Linh Truong, Schahram Dustdar
BMVC
2010
13 years 6 months ago
Cross View Gait Recognition Using Correlation Strength
Among various factors that can affect the performance of gait recognition, changes in viewpoint pose the biggest problem. In this work, we develop a novel approach to cross-view g...
Khalid Bashir, Tao Xiang, Shaogang Gong
BPM
2010
Springer
147views Business» more  BPM 2010»
13 years 6 months ago
From People to Services to UI: Distributed Orchestration of User Interfaces
Traditionally, workflow management systems aim at alleviating people's burden of coordinating repetitive business procedures, i.e., they coordinate people. Web service orchest...
Florian Daniel, Stefano Soi, Stefano Tranquillini,...
« Prev « First page 1072 / 1231 Last » Next »