Sciweavers

147 search results - page 27 / 30
» An Integrated Approach for Improving Cache Behavior
Sort
View
168
Voted
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 9 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
110
Voted
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
15 years 8 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
173
Voted
CIA
2008
Springer
15 years 5 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
129
Voted
OSDI
1996
ACM
15 years 4 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
131
Voted
CGA
2008
15 years 3 months ago
Virtual Inspector: A Flexible Visualizer for Dense 3D Scanned Models
The rapid evolution of automatic shape acquisition technologies will make huge amount of sampled 3D data available in the near future. Cultural Heritage (CH) domain is one of the ...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...