Sciweavers

698 search results - page 34 / 140
» Evaluating Key Statements Analysis
Sort
View
JMLR
2010
198views more  JMLR 2010»
13 years 4 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
CLEF
2010
Springer
13 years 6 months ago
Examining the Robustness of Evaluation Metrics for Patent Retrieval with Incomplete Relevance Judgements
Recent years have seen a growing interest in research into patent retrieval. One of the key issues in conducting information retrieval (IR) research is meaningful evaluation of the...
Walid Magdy, Gareth J. F. Jones
VLSID
2001
IEEE
200views VLSI» more  VLSID 2001»
14 years 10 months ago
Evaluation of the Traffic-Performance Characteristics of System-on-Chip Communication Architectures
The emergence of several communication architectures for System-on-Chips provides designers with a variety of design alternatives. In addition, the need to customize the system ar...
Kanishka Lahiri, Sujit Dey, Anand Raghunathan
BROADNETS
2005
IEEE
14 years 3 months ago
Modeling and performance evaluation of ISCSI storage area networks
Abstract— This paper provides a concise modeling and performance evaluation of the iSCSI storage area network (SAN) architecture and protocol. SANs play a key role in business co...
Christoph M. Gauger, Martin Köhn, Sebastian G...
INFOCOM
2005
IEEE
14 years 3 months ago
A performance vs. cost framework for evaluating DHT design tradeoffs under churn
Abstract— Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. The...
Jinyang Li, Jeremy Stribling, Robert Morris, M. Fr...