Sciweavers

17920 search results - page 3418 / 3584
» Recentering computer science
Sort
View
155
Voted
PVLDB
2010
167views more  PVLDB 2010»
15 years 3 months ago
The Performance of MapReduce: An In-depth Study
MapReduce has been widely used for large-scale data analysis in the Cloud. The system is well recognized for its elastic scalability and fine-grained fault tolerance although its...
Dawei Jiang, Beng Chin Ooi, Lei Shi, Sai Wu
163
Voted
PVLDB
2010
175views more  PVLDB 2010»
15 years 3 months ago
Dynamic Join Optimization in Multi-Hop Wireless Sensor Networks
To enable smart environments and self-tuning data centers, we are developing the Aspen system for integrating physical sensor data, as well as stream data coming from machine logi...
Svilen R. Mihaylov, Marie Jacob, Zachary G. Ives, ...
RAID
2010
Springer
15 years 3 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
RAID
2010
Springer
15 years 3 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
173
Voted
SIAMJO
2010
246views more  SIAMJO 2010»
15 years 3 months ago
A Singular Value Thresholding Algorithm for Matrix Completion
This paper introduces a novel algorithm to approximate the matrix with minimum nuclear norm among all matrices obeying a set of convex constraints. This problem may be understood a...
Jian-Feng Cai, Emmanuel J. Candès, Zuowei S...
« Prev « First page 3418 / 3584 Last » Next »