Sciweavers

488 search results - page 71 / 98
» Derivation of Java Monitors
Sort
View
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 5 days ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
SIGMOD
2006
ACM
138views Database» more  SIGMOD 2006»
15 years 12 months ago
B-tree indexes for high update rates
ct In some applications, data capture dominates query processing. For example, monitoring moving objects often requires more insertions and updates than queries. Data gathering usi...
Goetz Graefe
SIGMOD
2006
ACM
141views Database» more  SIGMOD 2006»
15 years 12 months ago
Contour map matching for event detection in sensor networks
Many sensor network applications, such as object tracking and disaster monitoring, require effective techniques for event detection. In this paper, we propose a novel event detect...
Wenwei Xue, Qiong Luo, Lei Chen 0002, Yunhao Liu
ESORICS
2002
Springer
15 years 11 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
ICCAD
2002
IEEE
157views Hardware» more  ICCAD 2002»
15 years 8 months ago
Combined dynamic voltage scaling and adaptive body biasing for lower power microprocessors under dynamic workloads
Dynamic voltage scaling (DVS) reduces the power consumption of processors when peak performance is unnecessary. However, the achievable power savings by DVS alone is becoming limi...
Steven M. Martin, Krisztián Flautner, Trevo...