Sciweavers

16702 search results - page 3313 / 3341
» Server operating systems
Sort
View
JMLR
2006
132views more  JMLR 2006»
14 years 9 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
MANSCI
2008
116views more  MANSCI 2008»
14 years 9 months ago
Call Center Outsourcing: Coordinating Staffing Level and Service Quality
In this paper, we study the contracting issues in an outsourcing supply chain consisting of a user company and a call center that does outsourcing work for the user company. We mo...
Z. Justin Ren, Yong-Pin Zhou
JSAC
2006
174views more  JSAC 2006»
14 years 9 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
MMS
2008
14 years 9 months ago
Evalvid-RA: trace driven simulation of rate adaptive MPEG-4 VBR video
Due to the increasing deployment of conversational real-time applications like VoIP and videoconferencing, the Internet is today facing new challenges. Low end-to-end delay is a vi...
Arne Lie, Jirka Klaue
EOR
2007
272views more  EOR 2007»
14 years 9 months ago
A dynamic logistics coordination model for evacuation and support in disaster response activities
This paper describes an integrated location-distribution model for coordinating logistics support and evacuation operations in disaster response activities. Logistics planning in ...
Wei Yi, Linet Özdamar
« Prev « First page 3313 / 3341 Last » Next »