Sciweavers

396 search results - page 62 / 80
» Argument Controlled Profiling
Sort
View
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
14 years 19 days ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
DSN
2009
IEEE
13 years 11 months ago
Processor reliability enhancement through compiler-directed register file peak temperature reduction
Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliab...
Chengmo Yang, Alex Orailoglu
GECCO
2010
Springer
187views Optimization» more  GECCO 2010»
13 years 11 months ago
Evolving agent behavior in multiobjective domains using fitness-based shaping
Multiobjective evolutionary algorithms have long been applied to engineering problems. Lately they have also been used to evolve behaviors for intelligent agents. In such applicat...
Jacob Schrum, Risto Miikkulainen
NSDI
2008
13 years 10 months ago
Reducing Network Energy Consumption via Sleeping and Rate-Adaptation
We present the design and evaluation of two forms of power management schemes that reduce the energy consumption of networks. The first is based on putting network components to s...
Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone...
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba