Sciweavers

27827 search results - page 5220 / 5566
» Generating
Sort
View
131
Voted
FAST
2008
15 years 6 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
142
Voted
FLAIRS
2008
15 years 6 months ago
Building Useful Models from Imbalanced Data with Sampling and Boosting
Building useful classification models can be a challenging endeavor, especially when training data is imbalanced. Class imbalance presents a problem when traditional classificatio...
Chris Seiffert, Taghi M. Khoshgoftaar, Jason Van H...
128
Voted
USENIX
2007
15 years 6 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
USS
2008
15 years 6 months ago
Highly Predictive Blacklisting
The notion of blacklisting communication sources has been a well-established defensive measure since the origins of the Internet community. In particular, the practice of compilin...
Jian Zhang, Phillip A. Porras, Johannes Ullrich
148
Voted
WSC
2008
15 years 6 months ago
Introducing age-based parameters into simulations of crowd dymanics
Very few crowds consist of individuals who are exactly the same. Defining variables, such as age, and how they affect an individual's movement, could increase realism in simu...
D. J. Kaup, Thomas L. Clarke, Rex Oleson, Linda C....
« Prev « First page 5220 / 5566 Last » Next »