Sciweavers

129 search results - page 22 / 26
» hais 2008
Sort
View
CIKM
2008
Springer
14 years 11 months ago
Mapping enterprise entities to text segments
Today, valuable business information is increasingly stored as unstructured data (documents, emails, etc.). For example, documents exchanged between business partners capture info...
Falk Brauer, Alexander Löser, Hong-Hai Do
POPL
2008
ACM
15 years 9 months ago
Enhancing modular OO verification with separation logic
Conventional specifications for object-oriented (OO) programs must adhere to behavioral subtyping in support of class inheritance and method overriding. However, this requirement ...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...
LISA
2008
14 years 11 months ago
Automatic Software Fault Diagnosis by Exploiting Application Signatures
Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs. While application pr...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 10 months ago
SPOT: A System for Detecting Projected Outliers From High-dimensional Data Streams
In this paper, we present a new technique, called Stream Projected Ouliter deTector (SPOT), to deal with outlier detection problem in high-dimensional data streams. SPOT is unique ...
Ji Zhang, Qigang Gao, Hai H. Wang
ICCCN
2008
IEEE
15 years 3 months ago
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 s...
Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai...