Sciweavers

2071 search results - page 139 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
179
Voted
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
16 years 2 months ago
Efficient Continuous Skyline Computation
In a number of emerging streaming applications, the data values that are produced have an associated time interval for which they are valid. A useful computation over such streami...
Michael D. Morse, Jignesh M. Patel, William I. Gro...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 1 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
RTSS
2008
IEEE
15 years 8 months ago
On the Scalability of Real-Time Scheduling Algorithms on Multicore Platforms: A Case Study
Multicore platforms are predicted to become significantly larger in the coming years. Given that real-time workloads will inevitably be deployed on such platforms, the scalabilit...
Björn B. Brandenburg, John M. Calandrino, Jam...
SARA
2007
Springer
15 years 7 months ago
DFS-Tree Based Heuristic Search
Abstract. In constraint satisfaction, local search is an incomplete method for finding a solution to a problem. Solving a general constraint satisfaction problem (CSP) is known to...
Montserrat Abril, Miguel A. Salido, Federico Barbe...
RAID
2005
Springer
15 years 7 months ago
Behavioral Distance for Intrusion Detection
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs and executing on different platforms—behave si...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song