Sciweavers

518 search results - page 35 / 104
» A Framework for Experimental Evaluation of Clustering Techni...
Sort
View
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 7 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
MM
2006
ACM
167views Multimedia» more  MM 2006»
15 years 7 months ago
Image annotation by large-scale content-based image retrieval
Image annotation has been an active research topic in recent years due to its potentially large impact on both image understanding and Web image search. In this paper, we target a...
Xirong Li, Le Chen, Lei Zhang, Fuzong Lin, Wei-Yin...
IPPS
2000
IEEE
15 years 4 months ago
Bandwidth-Efficient Collective Communication for Clustered Wide Area Systems
Metacomputing infrastructures couple multiple clusters (or MPPs) via wide-area networks. A major problem in programming parallel applications for such platforms is their hierarchi...
Thilo Kielmann, Henri E. Bal, Sergei Gorlatch
SSS
2010
Springer
143views Control Systems» more  SSS 2010»
14 years 11 months ago
Lightweight Live Migration for High Availability Cluster Service
High availability is a critical feature for service clusters and cloud computing, and is often considered more valuable than performance. One commonly used technique to enhance the...
Bo Jiang, Binoy Ravindran, Changsoo Kim
ICDE
2006
IEEE
146views Database» more  ICDE 2006»
16 years 2 months ago
Query Selection Techniques for Efficient Crawling of Structured Web Sources
The high quality, structured data from Web structured sources is invaluable for many applications. Hidden Web databases are not directly crawlable by Web search engines and are on...
Ping Wu, Ji-Rong Wen, Huan Liu, Wei-Ying Ma