Sciweavers

12519 search results - page 2418 / 2504
» Approximation Problems Categories
Sort
View
CCS
2006
ACM
15 years 7 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
160
Voted
CIKM
2006
Springer
15 years 7 months ago
Coupling feature selection and machine learning methods for navigational query identification
It is important yet hard to identify navigational queries in Web search due to a lack of sufficient information in Web queries, which are typically very short. In this paper we st...
Yumao Lu, Fuchun Peng, Xin Li, Nawaaz Ahmed
CIKM
2006
Springer
15 years 7 months ago
TRIPS and TIDES: new algorithms for tree mining
Recent research in data mining has progressed from mining frequent itemsets to more general and structured patterns like trees and graphs. In this paper, we address the problem of...
Shirish Tatikonda, Srinivasan Parthasarathy, Tahsi...
CLEF
2006
Springer
15 years 7 months ago
Monolingual and Bilingual Experiments in GeoCLEF2006
This paper presents the results of our initial experiments in the monolingual English, Spanish and Portuguese tasks and the Bilingual Spanish English, Spanish Portuguese, Englis...
Rocio Guillén
139
Voted
FPGA
2004
ACM
140views FPGA» more  FPGA 2004»
15 years 7 months ago
Using reconfigurability to achieve real-time profiling for hardware/software codesign
Embedded systems combine a processor with dedicated logic to meet design specifications at a reasonable cost. The attempt to amalgamate two distinct design environments introduces...
Lesley Shannon, Paul Chow
« Prev « First page 2418 / 2504 Last » Next »