Sciweavers

2552 search results - page 508 / 511
» Development of an evaluation model for Question Answering Sy...
Sort
View
CCS
2003
ACM
14 years 21 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
SPAA
2010
ACM
14 years 9 days ago
Towards optimizing energy costs of algorithms for shared memory architectures
Energy consumption by computer systems has emerged as an important concern. However, the energy consumed in executing an algorithm cannot be inferred from its performance alone: i...
Vijay Anand Korthikanti, Gul Agha
ICDCS
2000
IEEE
13 years 12 months ago
Scheduling Heuristics for Data Requests in an Oversubscribed Network with Priorities and Deadlines
Providing up-to-date input to users’ applications is an important data management problem for a distributed computing environment, where each data storage location and intermedi...
Mitchell D. Theys, Noah Beck, Howard Jay Siegel, M...
VISUALIZATION
1997
IEEE
13 years 11 months ago
Volume rendering of abdominal aortic aneurysms
Volume rendering is a valuable and important technique for scientific visualization. One well known application area is the reconstruction and visualization of output from medica...
Roger C. Tam, Christopher G. Healey, Borys Flak, P...
SAC
1997
ACM
13 years 11 months ago
The RasDaMan approach to multidimensional database management
Multidimensional discrete data (MDD), i.e., arrays of arbitrary size, dimension, and base type, are receiving growing attention among the database community. MDD occur in a variet...
Peter Baumann, Paula Furtado, Roland Ritsch, Norbe...