Sciweavers

2978 search results - page 588 / 596
» Operations Research
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 9 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ORGSCI
2010
92views more  ORGSCI 2010»
13 years 9 months ago
Are Technology-Intensive Industries More Dynamically Competitive? No and Yes
A growing body of research in management and related public policy fields concludes that the 1980s and 1990s saw greater dynamic competition throughout technology−intensive (“...
Paul M. Vaaler, Gerry McNamara
PE
2010
Springer
133views Optimization» more  PE 2010»
13 years 9 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
PVLDB
2010
115views more  PVLDB 2010»
13 years 9 months ago
ROXXI: Reviving witness dOcuments to eXplore eXtracted Information
In recent years, there has been considerable research on information extraction and constructing RDF knowledge bases. In general, the goal is to extract all relevant information f...
Shady Elbassuoni, Katja Hose, Steffen Metzger, Ral...
DOLAP
2010
ACM
13 years 9 months ago
Towards OLAP query reformulation in peer-to-peer data warehousing
Inter-business collaborative contexts prefigure a distributed scenario where companies organize and coordinate themselves to develop common and shared opportunities. Traditional b...
Matteo Golfarelli, Federica Mandreoli, Wilma Penzo...