Sciweavers

13004 search results - page 2580 / 2601
» Mining Software Data
Sort
View
CLEF
2009
Springer
15 years 26 days ago
Overview of QAST 2009
This paper describes the experience of QAST 2009, the third time a pilot track of CLEF has been held aiming to evaluate the task of Question Answering in Speech Transcripts. Four ...
Jordi Turmo, Pere Comas, Sophie Rosset, Olivier Ga...
CCS
2010
ACM
14 years 12 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
14 years 12 months ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
14 years 12 months ago
Analyzing the energy efficiency of a database server
Rising energy costs in large data centers are driving an agenda for energy-efficient computing. In this paper, we focus on the role of database software in affecting, and, ultimat...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
SOUPS
2010
ACM
14 years 12 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
« Prev « First page 2580 / 2601 Last » Next »