Sciweavers

123 search results - page 18 / 25
» Evaluating the Low Quality Measurements in Lighting Control ...
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
SIGCOMM
2006
ACM
15 years 3 months ago
Drafting behind Akamai (travelocity-based detouring)
To enhance web browsing experiences, content distribution networks (CDNs) move web content “closer” to clients by caching copies of web objects on thousands of servers worldwi...
Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovi...
RECSYS
2009
ACM
15 years 4 months ago
Using a trust network to improve top-N recommendation
Top-N item recommendation is one of the important tasks of recommenders. Collaborative filtering is the most popular approach to building recommender systems which can predict ra...
Mohsen Jamali, Martin Ester
SIGSOFT
2010
ACM
14 years 7 months ago
Combining hardware and software instrumentation to classify program executions
Several research efforts have studied ways to infer properties of software systems from program spectra gathered from the running systems, usually with software-level instrumentat...
Cemal Yilmaz, Adam A. Porter
RECSYS
2009
ACM
15 years 4 months ago
Generating transparent, steerable recommendations from textual descriptions of items
We propose a recommendation technique that works by collecting text descriptions of items and using this textual aura to compute the similarity between items using techniques draw...
Stephen J. Green, Paul Lamere, Jeffrey Alexander, ...