Sciweavers

91 search results - page 18 / 19
» A Proposal for the National Standard for Describing Digitize...
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
14 years 5 months ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
IDTRUST
2009
ACM
14 years 17 days ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WSDM
2009
ACM
161views Data Mining» more  WSDM 2009»
14 years 17 days ago
Predicting the readability of short web summaries
Readability is a crucial presentation attribute that web summarization algorithms consider while generating a querybaised web summary. Readability quality also forms an important ...
Tapas Kanungo, David Orr
CCS
2007
ACM
13 years 12 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
IROS
2006
IEEE
202views Robotics» more  IROS 2006»
13 years 11 months ago
Topological characterization of mobile robot behavior
— We propose to classify the behaviors of a mobile robot thanks to topological methods as an alternative to metric ones. To do so, we adapt an analysis scheme from Physics of non...
Aurélien Hazan, Frédéric Dave...