Sciweavers

2642 search results - page 184 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
AIPRF
2008
15 years 6 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
CIDR
2007
111views Algorithms» more  CIDR 2007»
15 years 6 months ago
Moirae: History-Enhanced Monitoring
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Magdalena Balazinska, YongChul Kwon, Nathan Kuchta...
NIPS
2008
15 years 6 months ago
MDPs with Non-Deterministic Policies
Markov Decision Processes (MDPs) have been extensively studied and used in the context of planning and decision-making, and many methods exist to find the optimal policy for probl...
Mahdi Milani Fard, Joelle Pineau
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
136
Voted
SIGOPS
2008
100views more  SIGOPS 2008»
15 years 3 months ago
Power management in the EPOS system
Power management strategies for embedded systems typically rely on static, application driven deactivation of components (e.g. sleep, suspend), or on dynamic voltage and frequency...
Geovani Ricardo Wiedenhoft, Lucas Francisco Wanner...