Sciweavers

8493 search results - page 1375 / 1699
» Implementing a distributed firewall
Sort
View
AIPRF
2008
15 years 6 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
DAGSTUHL
2010
15 years 6 months ago
Local and Global Illumination in the Volume Rendering Integral
This article is intended as an update of the major survey by Max [40] on optical models for direct volume rendering. It provides a brief overview of the subject scope covered by [...
Nelson Max, Min Chen
132
Voted
CASCON
2007
110views Education» more  CASCON 2007»
15 years 6 months ago
Runtime monitoring of web service conversations
For a system of distributed processes, correctness can be ensured by (statically) checking whether their composition satisfies properties of interest. In contrast, Web services a...
Yuan Gan, Marsha Chechik, Shiva Nejati, Jon Bennet...
CIDR
2007
105views Algorithms» more  CIDR 2007»
15 years 6 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
LREC
2010
155views Education» more  LREC 2010»
15 years 6 months ago
Efficient Minimal Perfect Hash Language Models
The recent availability of large collections of text such as the Google 1T 5-gram corpus (Brants and Franz, 2006) and the Gigaword corpus of newswire (Graff, 2003) have made it po...
David Guthrie, Mark Hepple, Wei Liu
« Prev « First page 1375 / 1699 Last » Next »