Sciweavers

45 search results - page 8 / 9
» Evaluation of Malware clustering based on its dynamic behavi...
Sort
View
CLUSTER
2003
IEEE
14 years 26 days ago
A General Self-Adaptive Task Scheduling System for Non-Dedicated Heterogeneous Computing
— The efforts to construct a national scale Grid computing environment have brought unprecedented computing capacity and complicacy. Exploiting this complex infrastructure requir...
Ming Wu, Xian-He Sun
CAMP
2005
IEEE
14 years 1 months ago
Reinforcement Learning for P2P Searching
— For a peer-to-peer (P2P) system holding massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured...
Luca Gatani, Giuseppe Lo Re, Alfonso Urso, Salvato...
ASSETS
2005
ACM
13 years 9 months ago
Gist summaries for visually impaired surfers
Anecdotal evidence suggests that Web document summaries provide the sighted reader with a basis for making decisions regarding the route to take within non-linear text; and additi...
Simon Harper, Neha Patel
ISSA
2004
13 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
ICDCS
2008
IEEE
14 years 2 months ago
Relative Network Positioning via CDN Redirections
—Many large-scale distributed systems can benefit from a service that allows them to select among alternative nodes based on their relative network positions. A variety of appro...
Ao-Jan Su, David R. Choffnes, Fabián E. Bus...