Sciweavers

3515 search results - page 646 / 703
» Resource usage analysis
Sort
View
147
Voted
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
15 years 7 days ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
DMIN
2009
180views Data Mining» more  DMIN 2009»
15 years 6 days ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
154
Voted
EUROPAR
2009
Springer
15 years 6 days ago
A Least-Resistance Path in Reasoning about Unstructured Overlay Networks
Unstructured overlay networks for peer-to-peer applications combined with stochastic algorithms for clustering and resource location are attractive due to low-maintenance costs and...
Giorgos Georgiadis, Marina Papatriantafilou
HIPC
2009
Springer
15 years 5 days ago
Extracting the textual and temporal structure of supercomputing logs
Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource o...
Sourabh Jain, Inderpreet Singh, Abhishek Chandra, ...
ICIP
2009
IEEE
15 years 4 days ago
Image interpolation with edge-preserving differential motion refinement
Motion estimation (ME) methods based on differential techniques provide useful information for video analysis, and moreover it is relatively easy to embed into them regularity con...
Marco Cagnazzo, Wided Miled, Thomas Maugey, B&eacu...