Sciweavers

1588 search results - page 298 / 318
» The Intelligence Within
Sort
View
ICDE
2010
IEEE
197views Database» more  ICDE 2010»
14 years 9 months ago
Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension
Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring resu...
Shicong Meng, Ting Wang, Ling Liu
WWW
2010
ACM
14 years 4 months ago
Exploiting social context for review quality prediction
Online reviews in which users publish detailed commentary about their experiences and opinions with products, services, or events are extremely valuable to users who rely on them ...
Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, L...
WIAMIS
2009
IEEE
14 years 4 months ago
Video analysis for browsing and printing
: © Video Analysis for Browsing and Printing Qian Lin, Tong Zhang, Mei Chen, Yining Deng, Brian Atkins HP Laboratories HPL-2008-215 video mining, video printing, user intent, vide...
Qian Lin, Tong Zhang, Mei Chen, Yining Deng, Clayt...
ECSQARU
2009
Springer
14 years 4 months ago
Encompassing Attacks to Attacks in Abstract Argumentation Frameworks
sing Attacks to Attacks in Abstract Argumentation Frameworks Pietro Baroni, Federico Cerutti, Massimiliano Giacomin, and Giovanni Guida Dipartimento di Elettronica per l’Automazi...
Pietro Baroni, Federico Cerutti, Massimiliano Giac...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 4 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...