Sciweavers

1917 search results - page 191 / 384
» User Model and Utility Based Power Management
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
14 years 8 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
EUROPAR
2009
Springer
15 years 8 months ago
Provider-Independent Use of the Cloud
Abstract. Utility computing offers researchers and businesses the potential of significant cost-savings in that it is possible for them to match the cost of their computing and s...
Terence J. Harmer, Peter Wright, Christina Cunning...
CCGRID
2006
IEEE
15 years 8 months ago
GDSA: A Grid-Based Distributed Simulation Architecture
This paper focuses on architecture suitable for largescale simulation system. Based on the scenario of large-scale internet simulation, the grid technology is introduced and a new...
Suihui Zhu, Zhihui Du, Xudong Chai
CIKM
2009
Springer
15 years 5 months ago
Empirical justification of the gain and discount function for nDCG
The nDCG measure has proven to be a popular measure of retrieval effectiveness utilizing graded relevance judgments. However, a number of different instantiations of nDCG exist, d...
Evangelos Kanoulas, Javed A. Aslam
RAID
2010
Springer
15 years 11 days ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...