Sciweavers

1704 search results - page 27 / 341
» Modeling virtualized applications using machine learning tec...
Sort
View
CN
2007
179views more  CN 2007»
14 years 9 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
78
Voted
BMCBI
2008
123views more  BMCBI 2008»
14 years 9 months ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
JSS
2008
163views more  JSS 2008»
14 years 9 months ago
CVM - A communication virtual machine
The convergence of data, voice, and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has resulted in a proli...
Yi Deng, Seyed Masoud Sadjadi, Peter J. Clarke, Va...
IJCNN
2006
IEEE
15 years 3 months ago
Spatiotemporal Pattern Recognition via Liquid State Machines
— The applicability of complex networks of spiking neurons as a general purpose machine learning technique remains open. Building on previous work using macroscopic exploration o...
Eric Goodman, Dan Ventura
ISPASS
2007
IEEE
15 years 3 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...