Sciweavers

2452 search results - page 485 / 491
» The Case for Precision Sharing
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 5 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
MATES
2010
Springer
13 years 5 months ago
Unifying Agent and Component Concepts: Jadex Active Components
The construction of distributed applications is a challenging task due to inherent system properties like message passing and concurrency. Current technology trends further increas...
Alexander Pokahr, Lars Braubach, Kai Jander
OR
2010
Springer
13 years 5 months ago
Modeling organic carbon and carbon-mediated soil processes in DSSAT v4.5
Cropping systems models have evolved over the last four decades in response to the demand for modeling to address more complex questions, including issues on sustainable productio...
Cheryl H. Porter, J. W. Jones, S. Adiku, A. J. Gij...
PPOPP
2010
ACM
13 years 5 months ago
Analyzing lock contention in multithreaded applications
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...
PVLDB
2010
158views more  PVLDB 2010»
13 years 5 months ago
MEET DB2: Automated Database Migration Evaluation
Commercial databases compete for market share, which is composed of not only net-new sales to those purchasing a database for the first time, but also competitive “win-backs”...
Reynold Xin, Patrick Dantressangle, Sam Lightstone...