Sciweavers

461 search results - page 18 / 93
» Mercury: Combining Performance with Dependability Using Self...
Sort
View
85
Voted
WSC
1998
15 years 6 days ago
Use of Simulation in Optimization of Maintenance Policies
Selecting an optimum maintenance policy independent of other parameters of the production system does not always yield the overall optimum operating conditions. For instance, high...
Farhad Azadivar, J. Victor Shu
89
Voted
DSN
2005
IEEE
15 years 4 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
IMCSIT
2010
14 years 8 months ago
Using Self Organizing Map to Cluster Arabic Crime Documents
This paper presents a system that combines two text mining techniques; information extraction and clustering. A rulebased approach is used to perform the information extraction tas...
Meshrif Alruily, Aladdin Ayesh, Abdulsamad Al-Marg...
JSAC
2010
170views more  JSAC 2010»
14 years 5 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
70
Voted
ISCA
1992
IEEE
125views Hardware» more  ISCA 1992»
15 years 2 months ago
Limits of Control Flow on Parallelism
This paper discusses three techniques useful in relaxing the constraints imposed by control flow on parallelism: control dependence analysis, executing multiple flows of control s...
Monica S. Lam, Robert P. Wilson