Sciweavers

280 search results - page 56 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
JSSPP
2005
Springer
13 years 11 months ago
Wave Scheduler: Scheduling for Faster Turnaround Time in Peer-Based Desktop Grid Systems
The recent success of Internet-based computing projects, coupled with rapid developments in peer-to-peer systems, has stimulated interest in the notion of harvesting idle cycles u...
Dayi Zhou, Virginia Mary Lo
MOBICOM
2006
ACM
13 years 11 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
13 years 10 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
ECIS
2003
13 years 6 months ago
A knowledge management application to support knowledge sharing in a design engineering community
The changing competitive landscape has brought new forces to bear on the manner in which new products are developed. These forces have put the creation and dissemination of knowle...
Brian Donnellan, Brian Fitzgerald
JUCS
2008
143views more  JUCS 2008»
13 years 5 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou