Sciweavers

3639 search results - page 621 / 728
» Experiments on IPv6 Testing
Sort
View
TDSC
2010
191views more  TDSC 2010»
13 years 7 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
CEC
2010
IEEE
13 years 7 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben
CIKM
2010
Springer
13 years 5 months ago
A late fusion approach to cross-lingual document re-ranking
The field of information retrieval still strives to develop models which allow semantic information to be integrated in the ranking process to improve performance in comparison to...
Dong Zhou, Séamus Lawless, Jinming Min, Vin...
PROMISE
2010
13 years 3 months ago
On the value of learning from defect dense components for software defect prediction
BACKGROUND: Defect predictors learned from static code measures can isolate code modules with a higher than usual probability of defects. AIMS: To improve those learners by focusi...
Hongyu Zhang, Adam Nelson, Tim Menzies
PVLDB
2010
116views more  PVLDB 2010»
13 years 3 months ago
Schism: a Workload-Driven Approach to Database Replication and Partitioning
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...