Sciweavers

2025 search results - page 287 / 405
» Software performance modelling using PEPA nets
Sort
View
102
Voted
IUI
2010
ACM
15 years 9 months ago
Facilitating exploratory search by model-based navigational cues
We present an extension of a computational cognitive model of social tagging and exploratory search called the semantic imitation model. The model assumes a probabilistic represen...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
WOSP
2005
ACM
15 years 6 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...
BMCBI
2011
14 years 7 months ago
CODA (CrossOver Distribution Analyzer): quantitative characterization of crossover position patterns along chromosomes
Background: During meiosis, homologous chromosomes exchange segments via the formation of crossovers. This phenomenon is highly regulated; in particular, crossovers are distribute...
Franck Gauthier, Olivier C. Martin, Matthieu Falqu...
105
Voted
CEC
2008
IEEE
15 years 7 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
93
Voted
ISPASS
2006
IEEE
15 years 6 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder