Sciweavers

441 search results - page 80 / 89
» Optimal Subsequence Bijection
Sort
View
74
Voted
ACSAC
2009
IEEE
15 years 4 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
EDBT
2009
ACM
186views Database» more  EDBT 2009»
15 years 4 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...
HPDC
2008
IEEE
15 years 4 months ago
Improving peer connectivity in wide-area overlays of virtual workstations
Self-configuring virtual networks rely on structured P2P routing to provide seamless connectivity among nodes through overlay routing of virtual IP packets, support decentralized...
Arijit Ganguly, P. Oscar Boykin, David Wolinsky, R...
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
15 years 3 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
HICSS
2006
IEEE
98views Biometrics» more  HICSS 2006»
15 years 3 months ago
Electricity Markets: How Many, Where and When?
Most markets compromise the economist’s ideal of matching the marginal benefits to consumers with the marginal cost of supply for incremental purchases because individual buyers...
Nodir Adilov, Richard E. Schuler