Sciweavers

18016 search results - page 3542 / 3604
» Data Mining - Concepts and Techniques
Sort
View
USENIX
2008
13 years 11 months ago
A Multi-Site Virtual Cluster System for Wide Area Networks
A virtual cluster is a promising technology for reducing management costs and improving capacity utilization in datacenters and computer centers. However, recent cluster virtualiz...
Takahiro Hirofuchi, Takeshi Yokoi, Tadashi Ebara, ...
USS
2008
13 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ARCS
2008
Springer
13 years 11 months ago
Intelligent Vehicle Handling: Steering and Body Postures While Cornering
Abstract. Vehicle handling and control is an essential aspect of intelligent driver assistance systems, a building block of the upcoming generation of "smart cars". A car...
Andreas Riener, Alois Ferscha, Michael Matscheko
CCS
2008
ACM
13 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
CIKM
2008
Springer
13 years 11 months ago
Active relevance feedback for difficult queries
Relevance feedback has been demonstrated to be an effective strategy for improving retrieval accuracy. The existing relevance feedback algorithms based on language models and vect...
Zuobing Xu, Ram Akella
« Prev « First page 3542 / 3604 Last » Next »