Sciweavers

15097 search results - page 2961 / 3020
» Image Processing in C
Sort
View
170
Voted
CN
2007
168views more  CN 2007»
15 years 5 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
150
Voted
CORR
2007
Springer
122views Education» more  CORR 2007»
15 years 5 months ago
Social Media as Windows on the Social Life of the Mind
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution ...
Cosma Rohilla Shalizi
CPHYSICS
2007
89views more  CPHYSICS 2007»
15 years 5 months ago
Numerical differentiation of experimental data: local versus global methods
In the context of the analysis of measured data, one is often faced with the task to differentiate data numerically. Typically, this occurs when measured data are concerned or dat...
Karsten Ahnert, Markus Abel
143
Voted
JCM
2006
77views more  JCM 2006»
15 years 5 months ago
Promote the Use of Explicit Delay Control
The Internet is undergoing changes of its traffic mix, with the IP-based interactive multimedia applications gaining momentum. According to studies, UDP-based multimedia traffic ha...
Xiaoyuan Gu, Dirk Markwardt, Lars C. Wolf
135
Voted
JSA
2006
94views more  JSA 2006»
15 years 5 months ago
An abstraction model for a Grid execution framework
action Model for a Grid Execution Framework Kaizar Amin,c,a Gregor von Laszewski,,a,b Mihael Hategan,b,a Rashid Al-Ali,d Omer Rana,d and David Walkerc aArgonne National Laboratory,...
Kaizar Amin, Gregor von Laszewski, Mihael Hategan,...
« Prev « First page 2961 / 3020 Last » Next »