Sciweavers

461 search results - page 18 / 93
» Mercury: Combining Performance with Dependability Using Self...
Sort
View
WSC
1998
13 years 10 months ago
Use of Simulation in Optimization of Maintenance Policies
Selecting an optimum maintenance policy independent of other parameters of the production system does not always yield the overall optimum operating conditions. For instance, high...
Farhad Azadivar, J. Victor Shu
DSN
2005
IEEE
14 years 2 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
IMCSIT
2010
13 years 6 months ago
Using Self Organizing Map to Cluster Arabic Crime Documents
This paper presents a system that combines two text mining techniques; information extraction and clustering. A rulebased approach is used to perform the information extraction tas...
Meshrif Alruily, Aladdin Ayesh, Abdulsamad Al-Marg...
JSAC
2010
170views more  JSAC 2010»
13 years 3 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
ISCA
1992
IEEE
125views Hardware» more  ISCA 1992»
14 years 26 days ago
Limits of Control Flow on Parallelism
This paper discusses three techniques useful in relaxing the constraints imposed by control flow on parallelism: control dependence analysis, executing multiple flows of control s...
Monica S. Lam, Robert P. Wilson