Sciweavers

1424 search results - page 282 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
KDD
2008
ACM
153views Data Mining» more  KDD 2008»
14 years 7 months ago
Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry
Text classification has matured as a research discipline over the last decade. Independently, business intelligence over structured databases has long been a source of insights fo...
Shantanu Godbole, Shourya Roy
CCS
2009
ACM
14 years 1 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
DATE
2008
IEEE
153views Hardware» more  DATE 2008»
14 years 1 months ago
An Optimized Message Passing Framework for Parallel Implementation of Signal Processing Applications
Novel reconfigurable computing platforms enable efficient realizations of complex signal processing applications by allowing exploitation of parallelization resulting in high thro...
Sankalita Saha, Jason Schlessman, Sebastian Puthen...
NOMS
2008
IEEE
118views Communications» more  NOMS 2008»
14 years 1 months ago
Policy-based self-management of hybrid ad hoc networks for dynamic channel configuration
— Wireless networks have become a ubiquitous reality and ever more surround our everyday activities. They form and disappear around us spontaneously and have become new means for...
Antonis M. Hadjiantonis, George Pavlou
LCPC
2007
Springer
14 years 1 months ago
Pillar: A Parallel Implementation Language
Abstract. As parallelism in microprocessors becomes mainstream, new programming languages and environments are emerging to meet the challenges of parallel programming. To support r...
Todd Anderson, Neal Glew, Peng Guo, Brian T. Lewis...