Sciweavers

861 search results - page 139 / 173
» Predicting Attack-prone Components
Sort
View
NCM
2010
13 years 6 months ago
Trusted business system model using context sensitiveness
—The objective of the paper is to propose a predictable context sensitive trust model for a business system. A business system can be imagined with four basic entities between wh...
Chandrasekaran Subramaniam, Sankarbharathy Ponnusa...
PVLDB
2010
151views more  PVLDB 2010»
13 years 6 months ago
Scalable Discovery of Best Clusters on Large Graphs
The identification of clusters, well-connected components in a graph, is useful in many applications from biological function prediction to social community detection. However, ...
Kathy Macropol, Ambuj K. Singh
SIGMETRICS
2010
ACM
156views Hardware» more  SIGMETRICS 2010»
13 years 6 months ago
A query language and runtime tool for evaluating behavior of multi-tier servers
As modern multi-tier systems are becoming increasingly large and complex, it becomes more difficult for system analysts to understand the overall behavior of the system, and diag...
Saeed Ghanbari, Gokul Soundararajan, Cristiana Amz...
TVCG
2010
152views more  TVCG 2010»
13 years 6 months ago
On the Fractal Dimension of Isosurfaces
—A (3D) scalar grid is a regular n1 × n2 × n3 grid of vertices where each vertex v is associated with some scalar value sv. Applying trilinear interpolation, the scalar grid de...
Marc Khoury, Rephael Wenger
EMNLP
2010
13 years 5 months ago
Constraints Based Taxonomic Relation Classification
Determining whether two terms in text have an ancestor relation (e.g. Toyota and car) or a sibling relation (e.g. Toyota and Honda) is an essential component of textual inference ...
Quang Do, Dan Roth