Sciweavers

1298 search results - page 252 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
79
Voted
AROBOTS
2002
131views more  AROBOTS 2002»
14 years 9 months ago
Automated Derivation of Primitives for Movement Classification
Abstract. We describe a new method for representing human movement compactly, in terms of a linear superimposition of simpler movements termed primitives. This method is a part of ...
Ajo Fod, Maja J. Mataric, Odest Chadwicke Jenkins
EDBT
2008
ACM
112views Database» more  EDBT 2008»
15 years 9 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...
ICDE
2010
IEEE
379views Database» more  ICDE 2010»
15 years 9 months ago
Osprey: Implementing MapReduce-Style Fault Tolerance in a Shared-Nothing Distributed Database
In this paper, we describe a scheme for tolerating and recovering from mid-query faults in a distributed shared nothing database. Rather than aborting and restarting queries, our s...
Christopher Yang, Christine Yen, Ceryen Tan, Samue...
79
Voted
ISPASS
2005
IEEE
15 years 3 months ago
Measuring Program Similarity: Experiments with SPEC CPU Benchmark Suites
Performance evaluation using only a subset of programs from a benchmark suite is commonplace in computer architecture research. This is especially true during early design space e...
Aashish Phansalkar, Ajay Joshi, Lieven Eeckhout, L...
CLUSTER
2004
IEEE
14 years 9 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...