Sciweavers

45 search results - page 8 / 9
» Evaluation of Malware clustering based on its dynamic behavi...
Sort
View
CLUSTER
2003
IEEE
13 years 10 months ago
A General Self-Adaptive Task Scheduling System for Non-Dedicated Heterogeneous Computing
— The efforts to construct a national scale Grid computing environment have brought unprecedented computing capacity and complicacy. Exploiting this complex infrastructure requir...
Ming Wu, Xian-He Sun
CAMP
2005
IEEE
13 years 11 months ago
Reinforcement Learning for P2P Searching
— For a peer-to-peer (P2P) system holding massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured...
Luca Gatani, Giuseppe Lo Re, Alfonso Urso, Salvato...
ASSETS
2005
ACM
13 years 7 months ago
Gist summaries for visually impaired surfers
Anecdotal evidence suggests that Web document summaries provide the sighted reader with a basis for making decisions regarding the route to take within non-linear text; and additi...
Simon Harper, Neha Patel
ISSA
2004
13 years 6 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
ICDCS
2008
IEEE
13 years 11 months ago
Relative Network Positioning via CDN Redirections
—Many large-scale distributed systems can benefit from a service that allows them to select among alternative nodes based on their relative network positions. A variety of appro...
Ao-Jan Su, David R. Choffnes, Fabián E. Bus...