Sciweavers

1365 search results - page 221 / 273
» Simple authentication for the web
Sort
View
ICAC
2008
IEEE
15 years 4 months ago
Tailoring Resources: The Energy Efficient Consolidation Strategy Goes Beyond Virtualization
Virtualization and consolidation are two complementary techniques widely adopted in a global strategy to reduce system management complexity. In this paper we show how two simple ...
Jordi Torres, David Carrera, Vicenç Beltran...
SBRN
2008
IEEE
15 years 4 months ago
Multi-label Text Categorization Using VG-RAM Weightless Neural Networks
In automated multi-label text categorization, an automatic categorization system should output a category set, whose size is unknown a priori, for each document under analysis. Ma...
Claudine Badue, Felipe Pedroni, Alberto Ferreira d...
BROADNETS
2007
IEEE
15 years 4 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...
ICDM
2007
IEEE
129views Data Mining» more  ICDM 2007»
15 years 4 months ago
Disk Aware Discord Discovery: Finding Unusual Time Series in Terabyte Sized Datasets
The problem of finding unusual time series has recently attracted much attention, and several promising methods are now in the literature. However, virtually all proposed methods...
Dragomir Yankov, Eamonn J. Keogh, Umaa Rebbapragad...
CAISE
2007
Springer
15 years 4 months ago
Publishing and Discovering Information and Services for Tagged Products
Radio frequency identification (RFID), and more recently the development of Near Field Communication (NFC) technology, have popularized the idea of linking real-world products wit...
Christof Roduner, Marc Langheinrich