Sciweavers

1404 search results - page 178 / 281
» Increasing Concurrency in Databases Using Program Analysis
Sort
View
127
Voted
ICCV
2009
IEEE
14 years 10 months ago
Realtime background subtraction from dynamic scenes
This paper examines the problem of moving object detection. More precisely, it addresses the difficult scenarios where background scene textures in the video might change over tim...
Li Cheng, Minglun Gong
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 7 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 6 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
112
Voted
NAR
2006
129views more  NAR 2006»
15 years 18 days ago
AliWABA: alignment on the web through an A-Bruijn approach
Multiple sequence alignment programs are an invaluable tool in computational biology. A-Bruijn Alignment (ABA) is a method for multiple sequence alignment that represents an align...
Neil C. Jones, Degui Zhi, Benjamin J. Raphael
SIGSOFT
2003
ACM
16 years 1 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg