Sciweavers

5330 search results - page 1054 / 1066
» The Performability Tool P'ility
Sort
View
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 11 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
EUSFLAT
2009
133views Fuzzy Logic» more  EUSFLAT 2009»
14 years 11 months ago
On the Information Provided by Uncertainty Measures in the Classification of Remote Sensing Images
This paper investigates the potential information provided to the user by the uncertainty measures applied to the possibility distributions associated with the spatial units of an ...
Luisa M. S. Gonçalves, Cidália C. Fo...
143
Voted
CODES
2010
IEEE
14 years 11 months ago
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
This paper describes PowerBooter, an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor...
Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang...
ACSAC
2010
IEEE
14 years 10 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
138
Voted
CCS
2010
ACM
14 years 10 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 1054 / 1066 Last » Next »