Sciweavers

1298 search results - page 237 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
101
Voted
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
15 years 8 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
ISPASS
2007
IEEE
15 years 8 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
WCRE
2000
IEEE
15 years 6 months ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...
113
Voted
WIESS
2000
15 years 3 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
100
Voted
GIS
2009
ACM
16 years 3 months ago
From GPS Traces to a Routable Road Map
This paper presents a method for automatically converting raw GPS traces from everyday vehicles into a routable road network. The method begins by smoothing raw GPS traces using a...
Lili Cao, John Krumm