Sciweavers

474 search results - page 67 / 95
» Empirical Evaluation of Techniques for Measuring Available B...
Sort
View
SIGCOMM
2010
ACM
13 years 11 months ago
Data center TCP (DCTCP)
Cloud data centers host diverse applications, mixing workloads that require small predictable latency with others requiring large sustained throughput. In this environment, today&...
Mohammad Alizadeh, Albert G. Greenberg, David A. M...
WSDM
2010
ACM
203views Data Mining» more  WSDM 2010»
14 years 8 months ago
Query Reformulation Using Anchor Text
Query reformulation techniques based on query logs have been studied as a method of capturing user intent and improving retrieval effectiveness. The evaluation of these techniques...
Van Dang, Bruce W. Croft
CIDM
2009
IEEE
14 years 5 months ago
Ensemble member selection using multi-objective optimization
— Both theory and a wealth of empirical studies have established that ensembles are more accurate than single predictive models. Unfortunately, the problem of how to maximize ens...
Tuve Löfström, Ulf Johansson, Henrik Bos...
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
GECCO
2005
Springer
134views Optimization» more  GECCO 2005»
14 years 4 months ago
Predicting mining activity with parallel genetic algorithms
We explore several different techniques in our quest to improve the overall model performance of a genetic algorithm calibrated probabilistic cellular automata. We use the Kappa ...
Sam Talaie, Ryan E. Leigh, Sushil J. Louis, Gary L...