Sciweavers

948 search results - page 171 / 190
» Analysis of SITA policies
Sort
View
VEE
2010
ACM
238views Virtualization» more  VEE 2010»
15 years 3 months ago
Optimizing crash dump in virtualized environments
Crash dump, or core dump is the typical way to save memory image on system crash for future offline debugging and analysis. However, for typical server machines with likely abund...
Yijian Huang, Haibo Chen, Binyu Zang
DRM
2003
Springer
15 years 3 months ago
Content and expression-based copy recognition for intellectual property protection
Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. This paper presents a way of fingerprinting text docu...
Özlem Uzuner, Randall Davis
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 2 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
15 years 1 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev