Sciweavers

1306 search results - page 167 / 262
» A Diagrammatic Approach to Model Completion
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 10 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
117
Voted
IPPS
2008
IEEE
15 years 7 months ago
Model-guided performance tuning of parameter values: A case study with molecular dynamics visualization
In this paper, we consider the interaction between application programmers and tools that automatically search a space of application-level parameters that are believed to impact ...
Yiinju L. Nelson, Bhupesh Bansal, Mary W. Hall, Ai...
AGILEDC
2006
IEEE
15 years 7 months ago
On Agile Performance Requirements Specification and Testing
Underspecified performance requirements can cause performance issues in a software system. However, a complete, upfront analysis of a software system is difficult, and usually not...
Chih-Wei Ho, Michael J. Johnson, Laurie Williams, ...
95
Voted
RAID
2005
Springer
15 years 6 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
PVLDB
2010
129views more  PVLDB 2010»
14 years 11 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...