Sciweavers

CNSM
2013
11 years 12 months ago
A scalable approach for structuring large-scale hierarchical cloud management systems
—In recent years, the scale of clouds and networks has increased greatly. It is important to ensure that the management systems used in these environments can scale as well. A ce...
Hendrik Moens, Filip De Turck
CLOUDNET
2013
43views more  CLOUDNET 2013»
11 years 12 months ago
Zeppelin - A third generation data center network virtualization technology based on SDN and MPLS
—Just like computation and storage, networks in data centers require virtualization in order to provide isolation between multiple co-existing tenants. Existing data center netwo...
James Kempf, Ying Zhang, Ramesh Mishra, Neda Behes...
CLOUDI
2013
115views more  CLOUDI 2013»
11 years 12 months ago
Cache conscious star-join in MapReduce environments
With the popularity of big data and cloud computing, data parallel framework MapReduce based data warehouse systems are used widely. Column store is a default data placement in th...
Guoliang Zhou, Yongli Zhu, Guilan Wang
CLA
2013
11 years 12 months ago
A Practical Application of Relational Concept Analysis to Class Model Factorization: Lessons Learned from a Thematic Information
During the design of class models for information systems, databases or programming, experts of the domain and designers discuss to identify and agree on the domain concepts. Forma...
Abdoulkader Osman Guédi, André Miralles,...
CISS
2013
IEEE
11 years 12 months ago
Near minimax line spectral estimation
This paper establishes a nearly optimal algorithm for estimating the frequencies and amplitudes of a mixture of sinusoids from noisy equispaced samples. We derive our algorithm by...
Gongguo Tang, Badri Narayan Bhaskar, Benjamin Rech...
CIARP
2013
Springer
11 years 12 months ago
Pattern Recognition Systems under Attack
Pattern recognition systems have been increasingly used in security applications, although it is known that carefully crafted attacks can compromise their security. We advocate tha...
Fabio Roli, Battista Biggio, Giorgio Fumera
CHITALY
2013
55views more  CHITALY 2013»
11 years 12 months ago
Leveraging Web 3D guidance in cultural heritage fruition
This paper describes a 3D tour of exhibitions set up for the celebration of the 150 years of Italian unity. Through a specifically developed Web plugin, the users can navigate the...
Rossana Damiano, Cristina Gena, Vincenzo Lombardo,...
CHI
2013
ACM
11 years 12 months ago
The many faces of facebook: experiencing social media as performance, exhibition, and personal archive
The growing use of social media means that an increasing amount of people’s lives are visible online. We draw from Goffman’s theatrical metaphor and Hogan’s exhibition appro...
Xuan Zhao, Niloufar Salehi, Sasha Naranjit, Sara A...
CHES
2013
Springer
72views Cryptology» more  CHES 2013»
11 years 12 months ago
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)
Abstract. Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security pro...
Amir Moradi, Oliver Mischke
CGO
2013
IEEE
11 years 12 months ago
Query-directed adaptive heap cloning for optimizing compilers
Andersen’s pointer analysis becomes more precise when applied with full heap cloning but unscalable for large, heapintensive programs. In contrast, k-callsite-sensitive heap clo...
Yulei Sui, Yue Li, Jingling Xue