Sciweavers

937 search results - page 129 / 188
» Employing Simulation to Evaluate Designs: The APEX Approach
Sort
View
UM
2010
Springer
15 years 4 months ago
Bayesian Credibility Modeling for Personalized Recommendation in Participatory Media
In this paper, we focus on the challenge that users face in processing messages on the web posted in participatory media settings, such as blogs. It is desirable to recommend to us...
Aaditeshwar Seth, Jie Zhang, Robin Cohen
EH
1999
IEEE
179views Hardware» more  EH 1999»
15 years 4 months ago
Artificial Evolution of Active Filters: A Case Study
This article focuses on the application of artificial evolution to the synthesis of analog active filters. The main objective of this research is the achievement of a new class of...
Ricardo Salem Zebulum, Marco Aurélio Cavalc...
EUROPAR
2008
Springer
15 years 1 months ago
Auction Protocols for Resource Allocations in Ad-Hoc Grids
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
Behnaz Pourebrahimi, Koen Bertels
JSAC
2006
172views more  JSAC 2006»
14 years 11 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
INFOCOM
2011
IEEE
14 years 3 months ago
SocialFilter: Introducing social trust to collaborative spam mitigation
—We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on wheth...
Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang