Sciweavers

4698 search results - page 264 / 940
» Making Functionality More General
Sort
View
142
Voted
CODES
2007
IEEE
15 years 8 months ago
Influence of procedure cloning on WCET prediction
For the worst-case execution time (WCET) analysis, especially loops are an inherent source of unpredictability and loss of precision. This is caused by the difficulty to obtain sa...
Paul Lokuciejewski, Heiko Falk, Martin Schwarzer, ...
CCS
2010
ACM
15 years 4 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
CISS
2008
IEEE
15 years 10 months ago
Partial side information problem: Equivalence of two inner bounds
— Consider the two-terminal partial side information problem, where one source is decoded under a distortion measure, while the other acts as a helper. There are two well known i...
Soumya Jana, Richard E. Blahut
AUIC
2006
IEEE
15 years 10 months ago
User interface layout with ordinal and linear constraints
User interfaces as well as documents use tabular layout mechanisms. The HTML table construct and the GridBag layout in Java are typical examples. There are, however, shortcomings ...
Christof Lutteroth, Gerald Weber
ICCSA
2005
Springer
15 years 9 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das