Sciweavers

2863 search results - page 518 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
MM
2005
ACM
157views Multimedia» more  MM 2005»
15 years 8 months ago
Chameleon: application level power management with performance isolation
In this paper, we present Chameleon—an application-level power management approach for reducing energy consumption in mobile processors. Our approach exports the entire responsi...
Xiaotao Liu, Prashant J. Shenoy, Mark D. Corner
263
Voted

Publication
767views
17 years 23 days ago
Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks
Congestion avoidance mechanisms allow a network to operate in the optimal region of low delay and high throughput, thereby, preventing the network from becoming congested. This is ...
D. Chiu and R. Jain
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
15 years 6 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
PODS
1997
ACM
72views Database» more  PODS 1997»
15 years 6 months ago
OLAP and Statistical Databases: Similarities and Differences
During the 1980's there was a lot of activity in the area of Statistical Databases, focusing mostly on socio-economic type applications, such as census data, national product...
Arie Shoshani
108
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 2 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin