Sciweavers

5758 search results - page 124 / 1152
» Anonymity-preserving data collection
Sort
View
IFIP
2010
Springer
15 years 2 months ago
The Network Data Handling War: MySQL vs. NfDump
Abstract. Network monitoring plays a crucial role in any network management environment. Especially nowadays, with network speed and load constantly increasing, more and more data ...
Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko ...
EDM
2008
129views Data Mining» more  EDM 2008»
15 years 2 months ago
Mining the Student Assessment Data: Lessons Drawn from a Small Scale Case Study
In this paper we describe an educational data mining (EDM) case study based on the data collected during the online assessment of students who were able to immediately receive tail...
Mykola Pechenizkiy, Toon Calders, Ekaterina Vasily...
110
Voted
ISCAPDCS
2004
15 years 2 months ago
Mobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...
102
Voted
NIPS
2003
15 years 2 months ago
Ranking on Data Manifolds
The Google search engine has enjoyed huge success with its web page ranking algorithm, which exploits global, rather than local, hyperlink structure of the web using random walks....
Dengyong Zhou, Jason Weston, Arthur Gretton, Olivi...
GRID
2008
Springer
15 years 1 months ago
User- and job-centric monitoring: Analysing and presenting large amounts of monitoring data
For data analysis or simulations (e.g. in particle physics) single users submit hundreds or thousands of jobs to the Grid. This puts a new burden on the users side - keeping an ov...
Henrik Eichenhardt, Ralph Müller-Pfefferkorn,...