Sciweavers

5200 search results - page 1007 / 1040
» Symbolic models for control systems
Sort
View
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 8 months ago
Automatic identification of quasi-experimental designs for discovering causal knowledge
Researchers in the social and behavioral sciences routinely rely on quasi-experimental designs to discover knowledge from large databases. Quasi-experimental designs (QEDs) exploi...
David D. Jensen, Andrew S. Fast, Brian J. Taylor, ...
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 7 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
14 years 2 months ago
Managing Information Intensive Service Facilities: Executive Contracts, Market Information, and Capacity Planning
in Progress – Extended Abstract Word count: 3124 Effectively managing IT service centers such as call centers, computerized diagnostic imaging facilities, data centers, e-commerc...
Yabing Jiang, Abraham Seidmann
INFOCOM
2009
IEEE
14 years 2 months ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
« Prev « First page 1007 / 1040 Last » Next »