Sciweavers

9219 search results - page 1817 / 1844
» Dynamics Modeling and Culling
Sort
View
FLAIRS
2007
15 years 3 months ago
Low-Effort Labeling of Network Events for Intrusion Detection in WLANs
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
NSDI
2008
15 years 3 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
ASPLOS
2008
ACM
15 years 3 months ago
Communication optimizations for global multi-threaded instruction scheduling
The recent shift in the industry towards chip multiprocessor (CMP) designs has brought the need for multi-threaded applications to mainstream computing. As observed in several lim...
Guilherme Ottoni, David I. August
BALT
2008
15 years 3 months ago
Flexible Database Platform for Biomedical Research with Multiple User Interfaces and a Universal Query Engine
Biomedical research on human subjects often requires a large amount of data to be collected by personal interviews, Internet based questionnaires, lab measurements or by extracting...
Margus Jäger, Liina Kamm, Darja Krushevskaja,...
IWCMC
2010
ACM
15 years 3 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
« Prev « First page 1817 / 1844 Last » Next »