Sciweavers

1298 search results - page 249 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
IPPS
1997
IEEE
15 years 1 months ago
Enhancing Software DSM for Compiler-Parallelized Applications
Current parallelizing compilers for message-passing machines only support a limited class of data-parallel applications. One method for eliminating this restriction is to combine ...
Peter J. Keleher, Chau-Wen Tseng
ECRIME
2007
15 years 1 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
MASCOTS
2010
14 years 11 months ago
PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
Zhenhuan Gong, Xiaohui Gu
67
Voted
ICMLA
2007
14 years 11 months ago
SVMotif: A Machine Learning Motif Algorithm
We describe SVMotif, a support vector machine-based learning algorithm for identification of cellular DNA transcription factor (TF) motifs extrapolated from known TF-gene interact...
Mark A. Kon, Yue Fan, Dustin T. Holloway, Charles ...
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
14 years 9 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...