Sciweavers

499 search results - page 84 / 100
» A Study on Latent Vulnerabilities
Sort
View
BCS
2008
15 years 1 months ago
Hardware Dependability in the Presence of Soft Errors
Using formal verification for designing hardware designs free from logic design bugs has been an active area of research since the last 15 years. Technology has matured and we hav...
Ashish Darbari, Bashir M. Al-Hashimi
100
Voted
JSAC
2006
140views more  JSAC 2006»
15 years 11 days ago
Backup reprovisioning to remedy the effect of multiple link failures in WDM mesh networks
As networks grow in size and complexity, both the probability and the impact of failures increase. The pre-allocated backup bandwidth, which has been widely investigated in the lit...
Jing Zhang, Keyao Zhu, Biswanath Mukherjee
116
Voted
CCS
2009
ACM
16 years 1 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
KDD
2007
ACM
176views Data Mining» more  KDD 2007»
16 years 25 days ago
Mining correlated bursty topic patterns from coordinated text streams
Previous work on text mining has almost exclusively focused on a single stream. However, we often have available multiple text streams indexed by the same set of time points (call...
Xuanhui Wang, ChengXiang Zhai, Xiao Hu, Richard Sp...
106
Voted
WSDM
2010
ACM
322views Data Mining» more  WSDM 2010»
15 years 9 months ago
Inferring Search Behaviors Using Partially Observable Markov (POM) Model
This article describes an application of the partially observable Markov (POM) model to the analysis of a large scale commercial web search log. Mathematically, POM is a variant o...
Kuansan Wang, Nikolas Gloy, Xiaolong Li