Sciweavers

4511 search results - page 704 / 903
» Observation Based System Security
Sort
View
164
Voted
AIPRF
2008
15 years 5 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
130
Voted
NETWORKING
2010
15 years 5 months ago
Measurement Study of Multi-party Video Conferencing
Abstract. More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies ...
Yue Lu, Yong Zhao, Fernando A. Kuipers, Piet Van M...
IM
2007
15 years 5 months ago
Capacity and Performance Overhead in Dynamic Resource Allocation to Virtual Containers
—Today’s enterprise data centers are shifting towards a utility computing model where many business critical applications share a common pool of infrastructure resources that o...
Zhikui Wang, Xiaoyun Zhu, Pradeep Padala, Sharad S...
116
Voted
SPLC
2007
15 years 4 months ago
Tailoring Infrastructure Software Product Lines by Static Application Analysis
Besides ordinary applications, also infrastructure software such as operating systems or database management systems is being developed as a software product line. With proper too...
Horst Schirmeier, Olaf Spinczyk
120
Voted
ATAL
2010
Springer
15 years 4 months ago
Changing neighbours: improving tag-based cooperation
In systems of autonomous self-interested agents, in which agents' neighbourhoods are defined by their connections to others, cooperation can arise through observation of the ...
Nathan Griffiths, Michael Luck