Sciweavers

2006 search results - page 289 / 402
» MUC-5 evaluation metrics
Sort
View
CLUSTER
2009
IEEE
15 years 6 months ago
Finding a tradeoff between host interrupt load and MPI latency over Ethernet
—Achieving high-performance message passing on top of generic ETHERNET hardware suffers from the NIC interruptdriven model where coalescing is usually involved. We present an in-...
Brice Goglin, Nathalie Furmento
130
Voted
DIM
2009
ACM
15 years 6 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 6 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
ICCS
2009
Springer
15 years 6 months ago
GRID Resource Searching on the GridSim Simulator
Nowadays, the Grid is the focus of multiple researches. Our work is centered on Resource Management for Grids as it is an opened and current research area. Decentralized, scalable ...
Antonia Gallardo, Luis Díaz de Cerio, Roc M...
ICSE
2001
IEEE-ACM
15 years 6 months ago
Improving Validation Activities in a Global Software Development
Global software development challenges traditional techniques of software engineering, such as peer reviews or teamwork. Effective teamwork and coaching of engineers highly contri...
Christof Ebert, Casimiro Hernandez Parro, Roland S...