Sciweavers

3708 search results - page 343 / 371
» Programming with C Exceptions
Sort
View
145 views 99 votes 15 years 6 months ago  SIGMETRICS 2004»
Fairness is a major issue in the operation of queues, perhaps it is the reason why queues were formed in the first place. Recent studies show that the fairness of a queueing syst...
214 views 116 votes 15 years 6 months ago  HICSS 2003»
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
183 views 123 votes 15 years 6 months ago  DOCENG 2003»
We describe the design and use of a personal digital library system, UpLib. The system consists of a full-text indexed repository accessed through an active agent via a Web interf...
116 views 93 votes 15 years 5 months ago  LCPC 2001»
While uniprocessor garbage collection is relatively well understood, experience with collectors for large multiprocessor servers is limited and it is unknown which techniques best ...
218 views 129 votes 15 years 5 months ago  AISC 1998»
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
91 views 90 votes 15 years 5 months ago  STOC 1997»
We examine a class of collective coin- ipping games that arises from randomized distributed algorithms with halting failures. In these games, a sequence of local coin ips is gener...
163 views 121 votes 15 years 4 months ago  FPGA 2004»
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
173 views 98 votes 15 years 2 months ago  CCS 2008»
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
101 views 96 votes 15 years 2 months ago  IMC 2007»
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with policies ab...
127 views 127 votes 15 years 2 months ago  NIPS 2004»
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...