Sciweavers

1591 search results - page 34 / 319
» Associating network flows with user and application informat...
Sort
View
PAM
2011
Springer
12 years 11 months ago
Evolution of Cache Replacement Policies to Track Heavy-Hitter Flows
Several important network applications cannot easily scale to higher data rates without requiring focusing just on the large traffic flows. Recent works have discussed algorithmic...
Martin Zádník, Marco Canini
CCS
2006
ACM
14 years 6 days ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
MIE
2008
112views Healthcare» more  MIE 2008»
13 years 10 months ago
Mining Knowledge from Corpora: an Application to Retrieval and Indexing
The present work aims at discovering new associations between medical concepts to be exploited as input in retrieval and indexing. Material and Methods: Association rules method is...
Lina Fatima Soualmia, Badisse Dahamna, Stéf...
IPC
2007
IEEE
14 years 2 months ago
Mining User Models for Effective Adaptation of Context-Aware Applications
Current context-aware adaptation techniques are limited in their support for user personalisation. Complex codebases, a reliance on developer modification and an inability to auto...
Shiu Lun Tsang, Siobhán Clarke
IPSN
2009
Springer
14 years 3 months ago
Archetype-based design: Sensor network programming for application experts, not just programming experts
Sensor network application experts such as biologists, geologists, and environmental engineers generally have little experience with, and little patience for, general-purpose and ...
Lan S. Bai, Robert P. Dick, Peter A. Dinda