Sciweavers

62 search results - page 7 / 13
» Using uncleanliness to predict future botnet addresses
Sort
View
IJBIS
2010
82views more  IJBIS 2010»
13 years 4 months ago
Simulation discounted cash flow valuation for internet companies
Discounted cash flow (DCF) is the most accepted approach for company valuation. It is well grounded in theory and practice. However, the DCF approach, which is commonly used for t...
Maged Ali, Ramzi El-Haddadeh, Tillal Eldabi, Ebrah...
OOPSLA
2005
Springer
14 years 29 days ago
X10: an object-oriented approach to non-uniform cluster computing
It is now well established that the device scaling predicted by Moore’s Law is no longer a viable option for increasing the clock frequency of future uniprocessor systems at the...
Philippe Charles, Christian Grothoff, Vijay A. Sar...
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
13 years 6 months ago
On optimal AUV track-spacing for underwater mine detection
— This work addresses the task of designing the optimal survey route that an autonomous underwater vehicle (AUV) should take in mine countermeasures (MCM) operations. It is assum...
David P. Williams
IROS
2006
IEEE
247views Robotics» more  IROS 2006»
14 years 1 months ago
Towards Open-Ended 3D Rotation and Shift Invariant Object Detection for Robot Companions
- Robot companions need to be able to constantly acquire knowledge about new objects for instance in order to detect them in the environment. This ability is necessary since it is ...
Jens Kubacki, Winfried Baum
ICSE
2010
IEEE-ACM
14 years 8 days ago
An eclectic approach for change impact analysis
Change impact analysis aims at identifying software artifacts being affected by a change. In the past, this problem has been addressed by approaches relying on static, dynamic, a...
Michele Ceccarelli, Luigi Cerulo, Gerardo Canfora,...