Sciweavers

82 search results - page 13 / 17
» How much parallelism is there in irregular applications
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
HCI
2009
13 years 5 months ago
YVision: A General Purpose Software Composition Framework
Abstract. Expectations for the industry of Human Computer Interaction are much higher today than they were ten or even five years ago. Innovative solutions to sense and gather info...
Antão Almada, Gonçalo Lopes, Andr&ea...
ICWE
2004
Springer
14 years 1 months ago
Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining
Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more comple...
Long Wang 0002, Christoph Meinel
WWW
2004
ACM
14 years 8 months ago
C3W: clipping, connecting and cloning for the web
Many of today's Web applications support just simple trial-anderror retrievals: supply one set of parameters, obtain one set of results. For a user who wants to examine a num...
Aran Lunzer, Jun Fujima, Kasper Hornbæk, Yuz...
EDOC
2006
IEEE
14 years 1 months ago
Model-Driven Dashboards for Business Performance Reporting
Business performance modeling and model-driven business transformation are two research directions that are attracting much attention lately. In this study, we propose an approach...
Pawan Chowdhary, Themis Palpanas, Florian Pinel, S...