Sciweavers

8655 search results - page 1527 / 1731
» Challenges for Trusted Computing
Sort
View
CSE
2009
IEEE
15 years 5 months ago
Inferring Unobservable Inter-community Links in Large Social Networks
Abstract—Social networks can be used to model social interactions between individuals. In many circumstances, not all interactions between individuals are observed. In such cases...
Heath Hohwald, Manuel Cebrián, Arturo Canal...
ICAC
2009
IEEE
15 years 5 months ago
vManage: loosely coupled platform and virtualization management in data centers
: © vManage: Loosely Coupled Platform and Virtualization Management in Data Centers Sanjay Kumar, Vanish Talwar, Vibhore Kumar, Parthasarathy Ranganathan, Karsten Schwan HP Labora...
Sanjay Kumar, Vanish Talwar, Vibhore Kumar, Partha...
118
Voted
ICAC
2009
IEEE
15 years 5 months ago
Self-correlating predictive information tracking for large-scale production systems
Automatic management of large-scale production systems requires a continuous monitoring service to keep track of the states of the managed system. However, it is challenging to ac...
Ying Zhao, Yongmin Tan, Zhenhuan Gong, Xiaohui Gu,...
96
Voted
SIBGRAPI
2009
IEEE
15 years 5 months ago
Detecting Buildings in Historical Photographs Using Bag-of-Keypoints
—The strategies for the preservation of historical documents can include their digitization, which is an effective way to make them publicly available while preventing degradatio...
Natalia C. Batista, Ana Paula Brandão Lopes...
97
Voted
ICST
2009
IEEE
15 years 5 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
« Prev « First page 1527 / 1731 Last » Next »