Sciweavers

1397 search results - page 57 / 280
» Application Performance of a Linux Cluster Using Converse
Sort
View
ISMIS
2005
Springer
15 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ICC
2009
IEEE
136views Communications» more  ICC 2009»
14 years 7 months ago
Performance of VoIP with DCCP for Satellite Links
Abstract--We present experimental results for the performance of selected voice codecs using the Datagram Congestion Control Protocol (DCCP) with TCP-Friendly Rate Control (TFRC) c...
Golam Sarwar, Roksana Boreli, Emmanuel Lochin
SIGMOD
2000
ACM
212views Database» more  SIGMOD 2000»
15 years 2 months ago
SQLEM: Fast Clustering in SQL using the EM Algorithm
Clustering is one of the most important tasks performed in Data Mining applications. This paper presents an e cient SQL implementation of the EM algorithm to perform clustering in...
Carlos Ordonez, Paul Cereghini
TFS
2008
117views more  TFS 2008»
14 years 9 months ago
A New Fuzzy Set Merging Technique Using Inclusion-Based Fuzzy Clustering
Abstract--This paper proposes a new method of merging parameterized fuzzy sets based on clustering in the parameters space, taking into account the degree of inclusion of each fuzz...
Samia Nefti, Mourad Oussalah, Uzay Kaymak
ECRTS
2009
IEEE
14 years 7 months ago
Generalized Tardiness Quantile Metric: Distributed DVS for Soft Real-Time Web Clusters
Performing QoS (Quality of Service) control in large computing systems requires an on line metric that is representative of the real state of the system. The Tardiness Quantile Me...
Luciano Bertini, Julius C. B. Leite, Daniel Moss&e...