Sciweavers

16070 search results - page 23 / 3214
» Identifying
Sort
View
124
Voted
EDCC
2005
Springer
15 years 9 months ago
A Data Mining Approach to Identify Key Factors in Dependability Experiments
Abstract. Our paper presents a novel approach for identifying the key infrastructural factors determining the behavior of systems in the presence of faults by the application of in...
Gergely Pintér, Henrique Madeira, Marco Vie...
142
Voted
INTELLCOMM
2004
Springer
15 years 8 months ago
An Implementation of Indoor Location Detection Systems Based on Identifying Codes
We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beac...
Rachanee Ungrangsi, Ari Trachtenberg, David Starob...
CCS
2000
ACM
15 years 7 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
130
Voted
KDD
1999
ACM
117views Data Mining» more  KDD 1999»
15 years 7 months ago
Identifying Distinctive Subsequences in Multivariate Time Series by Clustering
Most time series comparison algorithms attempt to discover what the members of a set of time series have in common. We investigate a di erent problem, determining what distinguish...
Tim Oates
96
Voted
CIKM
2009
Springer
15 years 7 months ago
Identifying static analysis techniques for finding non-fix hunks in fix revisions
Mining software repositories for bug detection requires accurate techniques of identifying bug-fix revisions. There have been many researches to find exact bug-fix revisions. Howe...
Yungbum Jung, Hakjoo Oh, Kwangkeun Yi