Sciweavers

4502 search results - page 844 / 901
» Regular Model Checking
Sort
View
WWW
2004
ACM
14 years 10 months ago
Fine-grained, structured configuration management for web projects
Researchers in Web engineering have regularly noted that existing Web application development environments provide little support for managing the evolution of Web applications. K...
Tien Nhut Nguyen, Ethan V. Munson, Cheng Thao
HPCA
2009
IEEE
14 years 10 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
SIGMOD
2003
ACM
124views Database» more  SIGMOD 2003»
14 years 10 months ago
Dynamic XML documents with distribution and replication
The advent of XML as a universal exchange format, and of Web services as a basis for distributed computing, has fostered the apparition of a new class of documents: dynamic XML do...
Serge Abiteboul, Angela Bonifati, Gregory Cobena, ...
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
14 years 7 months ago
Hierarchical Linear Discriminant Analysis for Beamforming.
This paper demonstrates the applicability of the recently proposed supervised dimension reduction, hierarchical linear discriminant analysis (h-LDA) to a well-known spatial locali...
Barry L. Drake, Haesun Park, Jaegul Choo