Sciweavers

10301 search results - page 1942 / 2061
» informs 2007
Sort
View
USENIX
2007
15 years 3 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
CIVR
2008
Springer
165views Image Analysis» more  CIVR 2008»
15 years 2 months ago
Balancing thread based navigation for targeted video search
Various query methods for video search exist. Because of the semantic gap each method has its limitations. We argue that for effective retrieval query methods need to be combined ...
Ork de Rooij, Cees G. M. Snoek, Marcel Worring
IMC
2007
ACM
15 years 2 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
IMC
2007
ACM
15 years 2 months ago
Compressed network monitoring for ip and all-optical networks
We address the problem of efficient end-to-end network monitoring of path metrics in communication networks. Our goal is to minimize the number of measurements or monitors requir...
Mark Coates, Yvan Pointurier, Michael Rabbat
FAST
2007
15 years 2 months ago
Failure Trends in a Large Disk Drive Population
It is estimated that over 90% of all new information produced in the world is being stored on magnetic media, most of it on hard disk drives. Despite their importance, there is re...
Eduardo Pinheiro, Wolf-Dietrich Weber, Luiz Andr&e...
« Prev « First page 1942 / 2061 Last » Next »