Sciweavers

2956 search results - page 223 / 592
» Targeted Data Prefetching
Sort
View
WISES
2004
15 years 4 months ago
Using Triggers to Find Significant Events During Monitoring of Real-Time Systems
-- A main prerequisite for the successful development of real-time systems is the capability for debugging and monitoring of these systems. The debugging of real-time systems is mo...
Idriz Smaili
138
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
130
Voted
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
15 years 1 months ago
Location and Scatter Matching for Dataset Shift in Text Mining
Dataset shift from the training data in a source domain to the data in a target domain poses a great challenge for many statistical learning methods. Most algorithms can be viewed ...
Bo Chen, Wai Lam, Ivor W. Tsang, Tak-Lam Wong
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 10 months ago
User Modeling Combining Access Logs, Page Content and Semantics
The paper proposes an approach to modeling users of large Web sites based on combining different data sources: access logs and content of the accessed pages are combined with sema...
Blaz Fortuna, Dunja Mladenic, Marko Grobelnik
202
Voted
AIM
2011
14 years 7 months ago
Transfer Learning by Reusing Structured Knowledge
Transfer learning aims to solve new learning problems by extracting and making use of the common knowledge found in related domains. A key element of transfer learning is to ident...
Qiang Yang, Vincent Wenchen Zheng, Bin Li, Hankz H...