Sciweavers

1672 search results - page 256 / 335
» Optimizing Monitoring Queries over Distributed Data
Sort
View
140
Voted
ACSAC
2010
IEEE
14 years 6 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
16 years 4 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
148
Voted
SDM
2012
SIAM
216views Data Mining» more  SDM 2012»
13 years 5 months ago
Feature Selection "Tomography" - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable
:  Feature Selection “Tomography” - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable George Forman HP Laboratories HPL-2010-19R1 Feature selection; ...
George Forman
129
Voted
WWW
2002
ACM
16 years 3 months ago
EDUTELLA: a P2P networking infrastructure based on RDF
Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which b...
Ambjörn Naeve, Boris Wolf, Changtao Qu, Matth...
135
Voted
SIGIR
1999
ACM
15 years 7 months ago
Information Retrieval as Statistical Translation
We propose a new probabilistic approach to information retrieval based upon the ideas and methods of statistical machine translation. The central ingredient in this approach is a ...
Adam L. Berger, John D. Lafferty