Sciweavers

3651 search results - page 601 / 731
» Data Mining for Security Applications
Sort
View
ISPASS
2007
IEEE
15 years 5 months ago
Simplifying Active Memory Clusters by Leveraging Directory Protocol Threads
Address re-mapping techniques in so-called active memory systems have been shown to dramatically increase the performance of applications with poor cache and/or communication beha...
Dhiraj D. Kalamkar, Mainak Chaudhuri, Mark Heinric...
ECML
2005
Springer
15 years 4 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
81
Voted
DEXA
2004
Springer
112views Database» more  DEXA 2004»
15 years 2 months ago
Efficient Algorithms for Multi-file Caching
Multi-File Caching issues arise in applications where a set of jobs are processed and each job requests one or more input files. A given job can only be started if all its input fi...
Ekow J. Otoo, Doron Rotem, Sridhar Seshadri
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
14 years 11 months ago
Worry-free database upgrades: automated model-driven evolution of schemas and complex mappings
Schema evolution is an unavoidable consequence of the application development lifecycle. The two primary schemas in an application, the client conceptual object model and the pers...
James F. Terwilliger, Philip A. Bernstein, Adi Unn...
COMSUR
2008
108views more  COMSUR 2008»
14 years 11 months ago
A survey of techniques for internet traffic classification using machine learning
The research community has begun looking for IP traffic classification techniques that do not rely on `well known' TCP or UDP port numbers, or interpreting the contents of pac...
Thuy T. T. Nguyen, Grenville J. Armitage