Sciweavers

6318 search results - page 1210 / 1264
» Data Leakage Detection
Sort
View
127
Voted
ICSE
2007
IEEE-ACM
16 years 1 months ago
Feedback-Directed Random Test Generation
We present a technique that improves random test generation by incorporating feedback obtained from executing test inputs as they are created. Our technique builds inputs incremen...
Carlos Pacheco, Shuvendu K. Lahiri, Michael D. Ern...
MOBISYS
2008
ACM
16 years 1 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
MOBISYS
2004
ACM
16 years 1 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 11 months ago
Near-optimal Supervised Feature Selection among Frequent Subgraphs.
Graph classification is an increasingly important step in numerous application domains, such as function prediction of molecules and proteins, computerised scene analysis, and an...
Alexander J. Smola, Arthur Gretton, Hans-Peter Kri...
EUROSYS
2009
ACM
15 years 10 months ago
Automated control of multiple virtualized resources
: Virtualized data centers enable consolidation of multiple applications and sharing of multiple resources among these applications. However, current virtualization technologies ar...
Pradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyu...
« Prev « First page 1210 / 1264 Last » Next »