Sciweavers

683 search results - page 109 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
ICDAR
2009
IEEE
13 years 6 months ago
Language Model Integration for the Recognition of Handwritten Medieval Documents
Building recognition systems for historical documents is a difficult task. Especially, when it comes to medieval scripts. The complexity is mainly affected by the poor quality and...
Markus Wüthrich, Marcus Liwicki, Andreas Fisc...
AINA
2007
IEEE
14 years 2 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
CIKM
2006
Springer
14 years 7 days ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger
PDP
2005
IEEE
14 years 2 months ago
WAS Control Center: An Autonomic Performance-Triggered Tracing Environment for WebSphere
Studying any aspect of an application server with high availability requirements can become a tedious task when a continuous monitoring of the server status is necessary. The crea...
David Carrera, David Garcia, Jordi Torres, Eduard ...
EUROPAR
2010
Springer
13 years 9 months ago
Profile-Driven Selective Program Loading
Abstract. Complex software systems use many shared libraries frequently composed of large off-the-shelf components. Only a limited number of functions are used from these shared li...
Tugrul Ince, Jeffrey K. Hollingsworth