Sciweavers

14078 search results - page 2476 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
SDM
2009
SIAM
118views Data Mining» more  SDM 2009»
16 years 1 months ago
Finding Links and Initiators: A Graph-Reconstruction Problem.
Consider a 0–1 observation matrix M, where rows correspond to entities and columns correspond to signals; a value of 1 (or 0) in cell (i, j) of M indicates that signal j has bee...
Evimaria Terzi, Heikki Mannila
133
Voted
EUROSYS
2006
ACM
16 years 1 months ago
Automated known problem diagnosis with event traces
Computer problem diagnosis remains a serious challenge to users and support professionals. Traditional troubleshooting methods relying heavily on human intervention make the proce...
Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zh...
MIR
2010
ACM
206views Multimedia» more  MIR 2010»
15 years 11 months ago
3d object retrieval using salient views
This paper presents a method for selecting salient 2D views to describe 3D objects for the purpose of retrieval. The views are obtained by first identifying salient points via a ...
Indriyati Atmosukarto, Linda G. Shapiro
CCS
2010
ACM
15 years 11 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
126
Voted
ACSAC
2009
IEEE
15 years 11 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
« Prev « First page 2476 / 2816 Last » Next »