Sciweavers

10293 search results - page 1938 / 2059
» Describing Semistructured Data
Sort
View
138
Voted
ACMSE
2009
ACM
15 years 7 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
98
Voted
CANDC
2009
ACM
15 years 7 months ago
Exploring illuminative systems in informal networks of adults
Whenever we feel those ‘higher’ and hard to define sensations like synchronicity, love, wholeness, and appreciation is this a pattern or illuminative system that is part of a ...
Amy K. Scatliff
108
Voted
CASES
2009
ACM
15 years 7 months ago
An accelerator-based wireless sensor network processor in 130nm CMOS
Networks of ultra-low-power nodes capable of sensing, computation, and wireless communication have applications in medicine, science, industrial automation, and security. Over the...
Mark Hempstead, Gu-Yeon Wei, David Brooks
99
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
SIGCOMM
2009
ACM
15 years 7 months ago
Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator
Many network applications have stringent end-to-end latency requirements, including VoIP and interactive video conferencing, automated trading, and high-performance computing—wh...
Ramana Rao Kompella, Kirill Levchenko, Alex C. Sno...
« Prev « First page 1938 / 2059 Last » Next »