Sciweavers

759 search results - page 121 / 152
» What Can Be Implemented Anonymously
Sort
View
ASPLOS
2006
ACM
14 years 3 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
ECOOPW
2000
Springer
14 years 2 months ago
Metadata and Adaptive Object-Models
Abstract. The unrelenting pace of change that confronts contemporary software developers compels them to make their applications more configurable, flexible, and adaptable. A way t...
Joseph W. Yoder, Reza Razavi
BIS
2009
154views Business» more  BIS 2009»
13 years 11 months ago
Using Process Mining to Generate Accurate and Interactive Business Process Maps
Abstract. The quality of today's digital maps is very high. This allows for new functionality as illustrated by modern car navigation systems (e.g., TomTom, Garmin, etc.), Goo...
Wil M. P. van der Aalst
SIGOPSE
2000
ACM
14 years 2 months ago
Congestion prices as feedback signals: an approach to QoS management
Recently there has been a renewed interest in the application of economic models to the management of computational resources. Most of this interest is focused on pricing models f...
Rolf Neugebauer, Derek McAuley
AMR
2006
Springer
119views Multimedia» more  AMR 2006»
13 years 12 months ago
The Potential of User Feedback Through the Iterative Refining of Queries in an Image Retrieval System
Inaccurate or ambiguous expressions in queries lead to poor results in information retrieval. We assume that iterative user feedback can improve the quality of queries. To this end...
Maher Ben Moussa, Marco Pasch, Djoerd Hiemstra, Pa...