Sciweavers

19 search results - page 2 / 4
» Determining the Origin and Structure of Person Names
Sort
View
CASCON
1996
111views Education» more  CASCON 1996»
13 years 6 months ago
A hybrid process for recovering software architecture
A large portion of the software used in industry today is legacy software. Legacy systems often evolve into dicult to maintain systems whose original design has been lost or else ...
Vassilios Tzerpos, Richard C. Holt
CCR
2002
85views more  CCR 2002»
13 years 4 months ago
The influence of ATM on operating systems
The features of ATM offered many attractions to the application community, such as fine-grained multiplexing and high-throughput links. These created considerable challenges for t...
Jonathan M. Smith
ICDE
2010
IEEE
251views Database» more  ICDE 2010»
14 years 4 months ago
Viewing a World of Annotations through AnnoVIP
The proliferation of electronic content has notably lead to the apparition of large corpora of interrelated structured documents (such as HTML and XML Web pages) and semantic annot...
Konstantinos Karanasos, Spyros Zoupanos
TDSC
2008
83views more  TDSC 2008»
13 years 4 months ago
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of...
T. Y. Wong, Man Hon Wong, John C. S. Lui
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 3 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig