Sciweavers

17129 search results - page 3294 / 3426
» Applied Computing
Sort
View
SDM
2009
SIAM
170views Data Mining» more  SDM 2009»
16 years 1 days ago
Optimal Distance Bounds on Time-Series Data.
Most data mining operations include an integral search component at their core. For example, the performance of similarity search or classification based on Nearest Neighbors is ...
Michail Vlachos, Philip S. Yu, Suleyman S. Kozat
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
16 years 1 days ago
Discovery of Geospatial Discriminating Patterns from Remote Sensing Datasets.
Large amounts of remotely sensed data calls for data mining techniques to fully utilize their rich information content. In this paper, we study new means of discovery and summariz...
Wei Ding 0003, Tomasz F. Stepinski, Josue Salazar
ICWS
2009
IEEE
16 years 20 hour ago
Service Supervision: Coordinating Web Services in Open Environment
ite Web service designed based on abstract Web services, which define only interfaces, allows an application developer to select services required for his application only by set...
Masahiro Tanaka, Toru Ishida, Yohei Murakami, Sato...
EUROSYS
2008
ACM
15 years 12 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
EUROSYS
2007
ACM
15 years 12 months ago
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
Continuously running systems require kernel software updates applied to them without downtime. Facilitating fast reboots, or delaying an update may not be a suitable solution in m...
Kristis Makris, Kyung Dong Ryu
« Prev « First page 3294 / 3426 Last » Next »