Sciweavers

1587 search results - page 253 / 318
» UFRGS@CLEF2009: Retrieval by Numbers
Sort
View
DFN
2009
15 years 1 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
HAIS
2008
Springer
15 years 1 months ago
A WeVoS-CBR Approach to Oil Spill Problem
The hybrid intelligent system presented here, forecasts the presence or not of oil slicks in a certain area of the open sea after an oil spill using CaseBased Reasoning methodology...
Emilio Corchado, Bruno Baruque, Aitor Mata, Juan M...
SYSTOR
2010
ACM
15 years 29 days ago
Empirical quantification of opportunities for content adaptation in web servers
A basic problem in the management of web servers is capacity planning: you want enough capacity to be able to serve peak loads, but not too much so as to avoid excessive costs. It...
Michael Gopshtein, Dror G. Feitelson
103
Voted
ICASSP
2010
IEEE
15 years 29 days ago
Balancing false alarms and hits in Spoken Term Detection
This paper presents methods to improve retrieval of Out-OfVocabulary (OOV) terms in a Spoken Term Detection (STD) system. We demonstrate that automated tagging of OOV regions help...
Carolina Parada, Abhinav Sethy, Bhuvana Ramabhadra...
103
Voted
CN
2010
136views more  CN 2010»
15 years 26 days ago
PCIR: Combining DHTs and peer clusters for efficient full-text P2P indexing
Distributed hash tables (DHTs) are very efficient for querying based on key lookups. However, building huge term indexes, as required for IR-style keyword search, poses a scalabil...
Odysseas Papapetrou, Wolf Siberski, Wolfgang Nejdl