Sciweavers

322 search results - page 46 / 65
» Recovering execution data from incomplete observations
Sort
View
SIGMOD
2009
ACM
136views Database» more  SIGMOD 2009»
14 years 10 months ago
A comparison of approaches to large-scale data analysis
There is currently considerable enthusiasm around the MapReduce (MR) paradigm for large-scale data analysis [17]. Although the basic control flow of this framework has existed in ...
Andrew Pavlo, Erik Paulson, Alexander Rasin, Danie...
DIMVA
2007
13 years 11 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 3 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
IFIP
1998
Springer
14 years 2 months ago
On the architecture of software component systems
Current object-oriented development practice is centered around application frameworks. In this paper, we argue that this approach is misleading, as it distracts from the ultimate...
M. Franz
MICCAI
2009
Springer
14 years 11 months ago
Biomechanically-Constrained 4D Estimation of Myocardial Motion
We propose a method for the analysis of Magnetic Resonance (MR) cardiac images with the goal of reconstructing the motion of the ventricular walls. The main feature of our method i...
Hari Sundar, Christos Davatzikos, George Biros