Sciweavers

1397 search results - page 212 / 280
» Dynamic power management using machine learning
Sort
View
CEAS
2008
Springer
15 years 6 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
ICMLA
2008
15 years 5 months ago
A Clustering Approach in Developing Prognostic Systems of Cancer Patients
Accurate prediction of survival rates of cancer patients is often key to stratify patients for prognosis and treatment. Survival prediction is often accomplished by the TNM system...
Dechang Chen, Kai Xing, Donald Henson, Li Sheng, A...
SIGSOFT
2007
ACM
16 years 4 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
DBPL
2007
Springer
115views Database» more  DBPL 2007»
15 years 10 months ago
XML Publishing: Bridging Theory and Practice
Transforming relational data into XML, as known as XML publishing, is often necessary when one wants to exchange data residing in databases or to create an XML interface of a tradi...
Wenfei Fan
PPPJ
2004
ACM
15 years 9 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi