Sciweavers

2094 search results - page 365 / 419
» A Bayesian Approach for User Modeling in Dialogue Systems
Sort
View
ISPASS
2006
IEEE
15 years 10 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
ICANN
2005
Springer
15 years 10 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
JCDL
2004
ACM
130views Education» more  JCDL 2004»
15 years 9 months ago
ETANA-DL: a digital library for integrated handling of heterogeneous archaeological data
Archaeologists have to deal with vast quantities of information, generated both in the field and laboratory. That information is heterogeneous in nature, and different projects ha...
Unni Ravindranathan, Rao Shen, Marcos André...
IJFCS
2006
111views more  IJFCS 2006»
15 years 4 months ago
Completeness and realizability: conditions for automatic generation of workflows
In recent years, workflow technology has greatly facilitated business process modeling and reengineering in information systems. On one hand, the separation of an application'...
Shiyong Lu, Arthur J. Bernstein, Philip M. Lewis
TWC
2008
125views more  TWC 2008»
15 years 4 months ago
Packet level performance analysis in wireless user-relaying networks
In this paper, the impact of user relaying on the behavior of a relay node, which acts as the source node at the same time, is analyzed in a wireless relay network at the packet le...
Jun Cai, Attahiru Sule Alfa, Pinyi Ren, Xuemin She...