Sciweavers

5489 search results - page 1060 / 1098
» Evaluating evaluation measure stability
Sort
View
ICIA
2007
15 years 2 months ago
When Is Assistance Really Helpful?
We regularly operate under the notion that one agent assists another when the first does something for the second. However, the story behind this is much more complicated. In thi...
Wayne Iba
USENIX
2007
15 years 2 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
WSC
2007
15 years 2 months ago
New greedy myopic and existing asymptotic sequential selection procedures: preliminary empirical results
Statistical selection procedures can identify the best of a finite set of alternatives, where “best” is defined in terms of the unknown expected value of each alternative’...
Stephen E. Chick, Jürgen Branke, Christian Sc...
USS
2008
15 years 2 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
AIRWEB
2008
Springer
15 years 1 months ago
A few bad votes too many?: towards robust ranking in social media
Online social media draws heavily on active reader participation, such as voting or rating of news stories, articles, or responses to a question. This user feedback is invaluable ...
Jiang Bian, Yandong Liu, Eugene Agichtein, Hongyua...
« Prev « First page 1060 / 1098 Last » Next »