Sciweavers

4378 search results - page 793 / 876
» An Evaluation Measure for Distributed Information Retrieval ...
Sort
View
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
EXPCS
2007
15 years 1 months ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...
SC
1995
ACM
15 years 1 months ago
Predicting Application Behavior in Large Scale Shared-memory Multiprocessors
In this paper we present an analytical-based framework for parallel program performance prediction. The main thrust of this work is to provide a means for treating realistic appli...
Karim Harzallah, Kenneth C. Sevcik
WSC
2007
15 years 7 days ago
IFAO-SIMO: a spatial-simulation based facility network optimization framework
This paper describes an innovative framework, iFAOSimo, which integrates optimization, simulation and GIS (geographic information system) techniques to handle complex spatial faci...
Ming Xie, Wei Wang, Wen Jun Yin, Jin Dong
LREC
2010
187views Education» more  LREC 2010»
14 years 11 months ago
Ontology-Based Categorization of Web Services with Machine Learning
We present the problem of categorizing web services according to a shallow ontology for presentation on a specialist portal, using their WSDL and associated textual documents foun...
Adam Funk, Kalina Bontcheva