Sciweavers

2421 search results - page 262 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CSMR
2010
IEEE
14 years 11 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
245
Voted
ICDE
1998
IEEE
108views Database» more  ICDE 1998»
16 years 6 months ago
Efficient Discovery of Functional and Approximate Dependencies Using Partitions
Discovery of functionaldependencies from relations has been identified as an important database analysis technique. In this paper, we present a new approach for finding functional...
Ykä Huhtala, Juha Kärkkäinen, Pasi ...
DIMVA
2006
15 years 6 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
DAC
2005
ACM
16 years 5 months ago
Operator-based model-order reduction of linear periodically time-varying systems
eriodically time-varying (LPTV) abstractions are useful for a variety of communication and computer subsystems. In this paper, we present a novel operator-based model-order reduct...
Yayun Wan, Jaijeet S. Roychowdhury
130
Voted
DAGM
2009
Springer
15 years 11 months ago
Pedestrian Detection by Probabilistic Component Assembly
We present a novel pedestrian detection system based on probabilistic component assembly. A part-based model is proposed which uses three parts consisting of head-shoulder, torso a...
Martin Rapus, Stefan Munder, Gregory Baratoff, Joa...