Sciweavers

1672 search results - page 256 / 335
» Optimizing Monitoring Queries over Distributed Data
Sort
View
ACSAC
2010
IEEE
14 years 8 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
16 years 6 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
SDM
2012
SIAM
216views Data Mining» more  SDM 2012»
13 years 7 months ago
Feature Selection "Tomography" - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable
:  Feature Selection “Tomography” - Illustrating that Optimal Feature Filtering is Hopelessly Ungeneralizable George Forman HP Laboratories HPL-2010-19R1 Feature selection; ...
George Forman
WWW
2002
ACM
16 years 5 months ago
EDUTELLA: a P2P networking infrastructure based on RDF
Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which b...
Ambjörn Naeve, Boris Wolf, Changtao Qu, Matth...
SIGIR
1999
ACM
15 years 9 months ago
Information Retrieval as Statistical Translation
We propose a new probabilistic approach to information retrieval based upon the ideas and methods of statistical machine translation. The central ingredient in this approach is a ...
Adam L. Berger, John D. Lafferty