Sciweavers

1298 search results - page 138 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
110
Voted
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
15 years 8 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
169
Voted
JCIT
2008
129views more  JCIT 2008»
15 years 3 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan
137
Voted
CCGRID
2006
IEEE
15 years 9 months ago
Statistical Data Reduction for Efficient Application Performance Monitoring
There is a growing need for systems that can monitor and analyze application performance data automatically in order to deliver reliable and sustained performance to applications....
Lingyun Yang, Jennifer M. Schopf, Catalin Dumitres...
111
Voted
BIBE
2007
IEEE
147views Bioinformatics» more  BIBE 2007»
15 years 10 months ago
A New Alignment-Independent Algorithm for Clustering Protein Sequences
—The rapid burgeoning of available protein data makes the use of clustering within families of proteins increasingly important, the challenge is to identify subfamilies of evolut...
Abdellali Kelil, Shengrui Wang, Ryszard Brzezinski
158
Voted
JDWM
2006
178views more  JDWM 2006»
15 years 3 months ago
Improved Data Partitioning for Building Large ROLAP Data Cubes in Parallel
The pre-computation of data cubes is critical to improving the response time of On-Line Analytical Processing (OLAP) systems and can be instrumental in accelerating data mining ta...
Ying Chen, Frank K. H. A. Dehne, Todd Eavis, Andre...