Sciweavers

683 search results - page 109 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
146
Voted
ICDAR
2009
IEEE
14 years 10 months ago
Language Model Integration for the Recognition of Handwritten Medieval Documents
Building recognition systems for historical documents is a difficult task. Especially, when it comes to medieval scripts. The complexity is mainly affected by the poor quality and...
Markus Wüthrich, Marcus Liwicki, Andreas Fisc...
AINA
2007
IEEE
15 years 7 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
94
Voted
CIKM
2006
Springer
15 years 4 months ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger
86
Voted
PDP
2005
IEEE
15 years 6 months ago
WAS Control Center: An Autonomic Performance-Triggered Tracing Environment for WebSphere
Studying any aspect of an application server with high availability requirements can become a tedious task when a continuous monitoring of the server status is necessary. The crea...
David Carrera, David Garcia, Jordi Torres, Eduard ...
EUROPAR
2010
Springer
15 years 1 months ago
Profile-Driven Selective Program Loading
Abstract. Complex software systems use many shared libraries frequently composed of large off-the-shelf components. Only a limited number of functions are used from these shared li...
Tugrul Ince, Jeffrey K. Hollingsworth