Sciweavers

2826 search results - page 113 / 566
» A resource-based analysis of IT sourcing
Sort
View
ACSW
2006
15 years 3 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan
IASTEDSEA
2004
15 years 3 months ago
ARIES: Refactoring support environment based on code clone analysis
Code clone has been regarded as one of factors that make software maintenance more difficult. A code clone is a code fragment in a source code that is identical or similar to anot...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
105
Voted
ICCV
2009
IEEE
14 years 11 months ago
Component analysis approach to estimation of tissue intensity distributions of 3D images
Many segmentation problems in medical imaging rely on accurate modeling and estimation of tissue intensity probability density functions. Gaussian mixture modeling, currently the ...
Arridhana Ciptadi, Cheng Chen, Vitali Zagorodnov
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
14 years 5 months ago
Schema evolution analysis for embedded databases
—Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for st...
Shengfeng Wu, Iulian Neamtiu
ICWE
2009
Springer
15 years 8 months ago
A Layout-Independent Web News Article Contents Extraction Method Based on Relevance Analysis
Abstract. The traditional Web news article contents extraction methods are time-costly and need much maintenance because they analyze the layout of news pages to generate the wrapp...
Hao Han, Takehiro Tokuda