Sciweavers

4307 search results - page 345 / 862
» Dynamic Spyware Analysis
Sort
View
148
Voted
KDD
2008
ACM
138views Data Mining» more  KDD 2008»
16 years 4 months ago
A visual-analytic toolkit for dynamic interaction graphs
In this article we describe a visual-analytic tool for the interrogation of evolving interaction network data such as those found in social, bibliometric, WWW and biological appli...
Xintian Yang, Sitaram Asur, Srinivasan Parthasarat...
157
Voted
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
16 years 4 months ago
Cut-and-stitch: efficient parallel learning of linear dynamical systems on smps
Multi-core processors with ever increasing number of cores per chip are becoming prevalent in modern parallel computing. Our goal is to make use of the multi-core as well as multi...
Lei Li, Wenjie Fu, Fan Guo, Todd C. Mowry, Christo...
149
Voted
STOC
2003
ACM
90views Algorithms» more  STOC 2003»
16 years 4 months ago
Work-competitive scheduling for cooperative computing with dynamic groups
The problem of cooperatively performing a set of t tasks in a decentralized setting where the computing medium is subject to failures is one of the fundamental problems in distrib...
Chryssis Georgiou, Alexander Russell, Alexander A....
142
Voted
DNIS
2010
Springer
177views Database» more  DNIS 2010»
15 years 10 months ago
Managing Dynamic Mixed Workloads for Operational Business Intelligence
Abstract. As data warehousing technology gains a ubiquitous presence in business today, companies are becoming increasingly reliant upon the information contained in their data war...
Harumi A. Kuno, Umeshwar Dayal, Janet L. Wiener, K...
INFOCOM
2009
IEEE
15 years 10 months ago
An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks
—State signaling and maintenance mechanisms play crucial roles in communication network protocols. State is used to facilitate indirections in protocols such as routing. Design a...
Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar ...