Sciweavers

7640 search results - page 198 / 1528
» Event Database Processing
Sort
View
SEC
2008
15 years 4 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee
WSC
2004
15 years 4 months ago
Towards Adaptive Caching for Parallel and Discrete Event Simulation
We investigate factors that impact the effectiveness of caching to speed up discrete event simulation. Walsh and Sirer have shown that a variant of function caching (staged simula...
Abhishek Chugh, Maria Hybinette
WSC
2000
15 years 4 months ago
Product-mix analysis with Discrete Event Simulation
Discrete Event Simulation (DES) has been used as a design and validation tool in various production and business applications. DES can also be utilized for analyzing the product-m...
Raid Al-Aomar
NN
2008
Springer
114views Neural Networks» more  NN 2008»
15 years 3 months ago
Event detection and localization for small mobile robots using reservoir computing
Reservoir Computing (RC) techniques use a fixed (usually randomly created) recurrent neural network, or more generally any dynamic system, which operates at the edge of stability,...
Eric A. Antonelo, Benjamin Schrauwen, Dirk Strooba...
101
Voted
WWW
2008
ACM
16 years 3 months ago
What do they think?: aggregating local views about news events and topics
The web has become an important medium for news delivery and consumption. Fresh content about a variety of topics and events is constantly being created and published on the web b...
Jiahui Liu, Larry Birnbaum