Sciweavers

1539 search results - page 305 / 308
» Spatial network modeling for databases
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CG
2004
Springer
13 years 7 months ago
ANTS--Augmented Environments
When interacting with natural or urban environments there are many situations where the ability to access data in real time becomes relevant. Augmented Reality (AR) technologies a...
Teresa Romão, Nuno Correia, A. Eduardo Dias...
COMPUTER
2010
127views more  COMPUTER 2010»
13 years 4 months ago
Data Stream Management Systems for Computational Finance
Computational finance leverages computer technologies to build models from large amounts of data to extract insight. In today's networked world, the amount of data available t...
Badrish Chandramouli, Mohamed H. Ali, Jonathan Gol...
BTW
2007
Springer
245views Database» more  BTW 2007»
14 years 1 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 7 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson