Sciweavers

9260 search results - page 119 / 1852
» Posterior distributions are computable from predictive distr...
Sort
View
ISI
2008
Springer
15 years 23 days ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
67
Voted
ICS
2003
Tsinghua U.
15 years 6 months ago
A GSA-based compiler infrastructure to extract parallelism from complex loops
Manuel Arenaz, Juan Touriño, Ramon Doallo
159
Voted
WETICE
2009
IEEE
15 years 7 months ago
PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
—Cloud Computing, born in the e-business context, and GRID computing, originated in the e-science context, are two different but similar paradigms for managing large sets of dist...
Emilio Pasquale Mancini, Massimiliano Rak, Umberto...
83
Voted
IPPS
2000
IEEE
15 years 4 months ago
Components Are from Mars
We advocate an approach towards the characterisation of components where their qualifications are deduced systematically from a small set of elementary assumptions. Using the chara...
Michel R. V. Chaudron, Edwin D. de Jong
MSWIM
2006
ACM
15 years 6 months ago
Pattern matching based link quality prediction in wireless mobile ad hoc networks
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Károly Farkas, Theus Hossmann, Lukas Ruf, B...