Sciweavers

1687 search results - page 152 / 338
» Which pointer analysis should I use
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
A Framework for Understanding Botnets
Botnets have become a severe threat to the cyberspace. However, existing studies are typically conducted in an ad hoc fashion, by demonstrating specific analysis on captured bot ...
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu
ICDM
2008
IEEE
113views Data Mining» more  ICDM 2008»
15 years 10 months ago
Online Reliability Estimates for Individual Predictions in Data Streams
Several predictive systems are nowadays vital for operations and decision support. The quality of these systems is most of the time defined by their average accuracy which has lo...
Pedro Pereira Rodrigues, João Gama, Zoran B...
SIGIR
2003
ACM
15 years 9 months ago
XML retrieval: what to retrieve?
The fundamental difference between standard information retrieval and XML retrieval is the unit of retrieval. In traditional IR, the unit of retrieval is fixed: it is the comple...
Jaap Kamps, Maarten Marx, Maarten de Rijke, Bö...
APVIS
2001
15 years 5 months ago
Rapid Assembly and Deployment of Domain Visualisation Solutions
Information visualisation exploits the natural perceptual capabilities of the decisionfacilitate the rapid assimilation and analysis of abstract, complex and often voluminous info...
Tim Pattison, Rudi Vernik, Daniel Goodburn, Matthe...
TMC
2012
13 years 6 months ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...