Sciweavers

189 search results - page 16 / 38
» An Approach towards Benchmarking of Fault-Tolerant Commercia...
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 7 days ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
MOBISYS
2011
ACM
14 years 2 months ago
TagSense: a smartphone-based approach to automatic image tagging
Mobile phones are becoming the convergent platform for personal sensing, computing, and communication. This paper attempts to exploit this convergence towards the problem of autom...
Chuan Qin, Xuan Bao, Romit Roy Choudhury, Srihari ...
DOLAP
2006
ACM
15 years 5 months ago
Designing what-if analysis: towards a methodology
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need b...
Matteo Golfarelli, Stefano Rizzi, Andrea Proli
ATAL
2010
Springer
15 years 25 days ago
MagneBike: toward multi climbing robots for power plant inspection
An ever-growing infrastructure, including existing and newly built power plants, as well as a rising environmental awareness in society call for inspection and maintenance systems...
Andreas Breitenmoser, Fabien Tâche, Gilles C...
ACSAC
2006
IEEE
15 years 5 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu