Sciweavers

12052 search results - page 2028 / 2411
» computing 2010
Sort
View
FC
2010
Springer
150views Cryptology» more  FC 2010»
15 years 5 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
GECON
2010
Springer
198views Business» more  GECON 2010»
15 years 5 months ago
Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers
Success of Cloud computing requires that both customers and providers can be confident that signed Service Level Agreements (SLA) are supporting their respective business activitie...
Iñigo Goiri, Ferran Julià, Josep Ori...
HM
2010
Springer
161views Optimization» more  HM 2010»
15 years 5 months ago
A Memetic Algorithm for Reconstructing Cross-Cut Shredded Text Documents
The reconstruction of destroyed paper documents became of more interest during the last years. On the one hand it (often) occurs that documents are destroyed by mistake while on th...
Christian Schauer, Matthias Prandtstetter, Gü...
ICA
2010
Springer
15 years 5 months ago
Use of Prior Knowledge in a Non-Gaussian Method for Learning Linear Structural Equation Models
Abstract. We discuss causal structure learning based on linear structural equation models. Conventional learning methods most often assume Gaussianity and create many indistinguish...
Takanori Inazumi, Shohei Shimizu, Takashi Washio
ICA
2010
Springer
15 years 5 months ago
Common SpatioTemporal Pattern Analysis
In this work we present a method for the estimation of a rank-one pattern living in two heterogeneous spaces, when observed through a mixture in multiple observation sets. Using a ...
Ronald Phlypo, Nisrine Jrad, Bertrand Rivet, Marco...
« Prev « First page 2028 / 2411 Last » Next »