Sciweavers

205 search results - page 36 / 41
» Performance Analysis of MPI Collective Operations
Sort
View
CCS
2010
ACM
14 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CCR
2010
139views more  CCR 2010»
14 years 9 months ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...
CLEF
2007
Springer
15 years 3 months ago
MIRACLE at ImageCLEFphoto 2007: Evaluation of Merging Strategies for Multilingual and Multimedia Information Retrieval
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Photographic Retrieval task of ImageCLEF 2007. For this campaign, the main purpose of our ex...
Julio Villena-Román, Sara Lana-Serrano, Jos...
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 8 months ago
Adding HL7 version 3 data types to PostgreSQL
The HL7 standard is widely used to exchange medical information electronically. As a part of the standard, HL7 defines scalar communication data types like physical quantity, poin...
Yeb Havinga, Willem Dijkstra, Ander de Keijzer
DGO
2006
134views Education» more  DGO 2006»
14 years 11 months ago
Next steps in near-duplicate detection for eRulemaking
Large volume public comment campaigns and web portals that encourage the public to customize form letters produce many near-duplicate documents, which increases processing and sto...
Hui Yang, Jamie Callan, Stuart W. Shulman