Sciweavers

2007 search results - page 289 / 402
» MUC-3 evaluation metrics
Sort
View
ICNP
2002
IEEE
14 years 3 months ago
Sync-MS: Synchronized Messaging Service for Real-Time Multi-Player Distributed Games
Real-time, online multi-player games are becoming increasingly popular due to advances in game design and the proliferation of broadband Internet access. However, fairness remains...
Yow-Jian Lin, Katherine Guo, Sanjoy Paul
ICPPW
2002
IEEE
14 years 3 months ago
A Statistical Approach for the Analysis of the Relation Between Low-Level Performance Information, the Code, and the Environment
This paper presents a methodology for aiding a scientific programmer to evaluate the performance of parallel programs on advanced architectures. It applies well-defined design o...
Nayda G. Santiago, Diane T. Rover, Domingo Rodr&ia...
CLUSTER
2009
IEEE
14 years 2 months ago
Finding a tradeoff between host interrupt load and MPI latency over Ethernet
—Achieving high-performance message passing on top of generic ETHERNET hardware suffers from the NIC interruptdriven model where coalescing is usually involved. We present an in-...
Brice Goglin, Nathalie Furmento
DIM
2009
ACM
14 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 2 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...