Sciweavers

389 search results - page 19 / 78
» Using Information from Prior Runs to Improve Automated Tunin...
Sort
View
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
14 years 7 months ago
Warping Indexes with Envelope Transforms for Query by Humming
A Query by Humming system allows the user to find a song by humming part of the tune. No musical training is needed. Previous query by humming systems have not provided satisfacto...
Yunyue Zhu, Dennis Shasha
CEAS
2004
Springer
14 years 24 days ago
Stopping Spam by Extrusion Detection
End users are often unaware that their systems have been compromised and are being used to send bulk unsolicited email (spam). We show how automated processing of the email logs re...
Richard Clayton
USENIX
2007
13 years 9 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
ICONIP
2009
13 years 5 months ago
Learning Gaussian Process Models from Uncertain Data
It is generally assumed in the traditional formulation of supervised learning that only the outputs data are uncertain. However, this assumption might be too strong for some learni...
Patrick Dallaire, Camille Besse, Brahim Chaib-draa
VLDB
2007
ACM
128views Database» more  VLDB 2007»
14 years 7 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...