Sciweavers

13841 search results - page 2508 / 2769
» Algorithms and Constraint Programming
Sort
View
KDD
2006
ACM
174views Data Mining» more  KDD 2006»
16 years 4 months ago
Onboard classifiers for science event detection on a remote sensing spacecraft
Typically, data collected by a spacecraft is downlinked to Earth and pre-processed before any analysis is performed. We have developed classifiers that can be used onboard a space...
Ashley Davies, Benjamin Cichy, Dominic Mazzoni, Ng...
SIGMOD
2004
ACM
165views Database» more  SIGMOD 2004»
16 years 4 months ago
Industrial-Strength Schema Matching
Schema matching identifies elements of two given schemas that correspond to each other. Although there are many algorithms for schema matching, little has been written about build...
Philip A. Bernstein, Sergey Melnik, Michalis Petro...
ICSE
2005
IEEE-ACM
16 years 4 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
120
Voted
ICSE
2005
IEEE-ACM
16 years 4 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
MOBISYS
2008
ACM
16 years 3 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
« Prev « First page 2508 / 2769 Last » Next »