Sciweavers

12863 search results - page 2301 / 2573
» Dynamic Data Mining
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 11 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 8 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
IWMM
2011
Springer
245views Hardware» more  IWMM 2011»
14 years 7 months ago
Waste not, want not: resource-based garbage collection in a shared environment
To achieve optimal performance, garbage-collected applications must balance the sizes of their heaps dynamically. Sizing the heap too small can reduce throughput by increasing the...
Matthew Hertz, Stephen Kane, Elizabeth Keudel, Ton...
POPL
2011
ACM
14 years 7 months ago
Safe nondeterminism in a deterministic-by-default parallel language
A number of deterministic parallel programming models with strong safety guarantees are emerging, but similar support for nondeterministic algorithms, such as branch and bound sea...
Robert L. Bocchino Jr., Stephen Heumann, Nima Hona...
ICDE
2012
IEEE
239views Database» more  ICDE 2012»
13 years 6 months ago
Provenance-based Indexing Support in Micro-blog Platforms
Abstract— Recently, lots of micro-blog message sharing applications have emerged on the web. Users can publish short messages freely and get notified by the subscriptions instan...
Junjie Yao, Bin Cui, Zijun Xue, Qingyun Liu
« Prev « First page 2301 / 2573 Last » Next »