Sciweavers

3031 search results - page 523 / 607
» SNMS - Shadow Network Management System
Sort
View
106
Voted
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 9 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
126
Voted
CLEF
2005
Springer
15 years 9 months ago
Exploiting Linguistic Indices and Syntactic Structures for Multilingual Question Answering: ITC-irst at CLEF 2005
This year we participated at 4 Question Answering tasks at CLEF: the Italian monolingual (I), Italian-English (I/E), Bulgarian monolingual (B), and Bulgarian-English (B/E) bilingu...
Hristo Tanev, Milen Kouylekov, Bernardo Magnini, M...
119
Voted
DSOM
2005
Springer
15 years 9 months ago
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Zhikui Wang, Xiaoyun Zhu, Sharad Singhal
109
Voted
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
15 years 9 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta
147
Voted
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 9 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy