Sciweavers

3604 search results - page 661 / 721
» All Common Subsequences
Sort
View
CLA
2007
15 years 1 months ago
Representing Numeric Values in Concept Lattices
Formal Concept Analysis is based on the occurrence of symbolic attributes in individual objects, or observations. But, when the attribute is numeric, treatment has been awkward. In...
John L. Pfaltz
CSREAESA
2008
15 years 1 months ago
Achieving Industrial Strength Timing Predictions of Embedded System Behavior
This paper discusses why the extensive scientific results on predicting embedded systems temporal behavior never, or very seldom, reaches the industrial community. We also point ou...
Mikael Nolin, Jukka Mäki-Turja, Kaj Hänn...
DIMVA
2008
15 years 1 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
NSDI
2010
15 years 1 months ago
Reverse traceroute
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Rese...
Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Ku...
SDM
2010
SIAM
144views Data Mining» more  SDM 2010»
15 years 1 months ago
Predictive Modeling with Heterogeneous Sources
Lack of labeled training examples is a common problem for many applications. In the same time, there is usually an abundance of labeled data from related tasks. But they have diff...
Xiaoxiao Shi, Qi Liu, Wei Fan, Qiang Yang, Philip ...