Sciweavers

217 search results - page 35 / 44
» Modeling a distributed intrusion detection system using coll...
Sort
View
USENIX
2007
13 years 10 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
ECIS
2003
13 years 9 months ago
Leveraging organizational knowledge to formulate manufacturing strategy
This paper describes a web-based system that integrates knowledge management and decision-making features to enable short-term communities of practice develop manufacturing strate...
Nikos I. Karacapilidis, Emmanuel Adamides, Christi...
CSL
2006
Springer
13 years 7 months ago
A study in machine learning from imbalanced data for sentence boundary detection in speech
Enriching speech recognition output with sentence boundaries improves its human readability and enables further processing by downstream language processing modules. We have const...
Yang Liu, Nitesh V. Chawla, Mary P. Harper, Elizab...
ARC
2009
Springer
188views Hardware» more  ARC 2009»
14 years 2 months ago
Word-Length Optimization and Error Analysis of a Multivariate Gaussian Random Number Generator
Abstract. Monte Carlo simulation is one of the most widely used techniques for computationally intensive simulations in mathematical analysis and modeling. A multivariate Gaussian ...
Chalermpol Saiprasert, Christos-Savvas Bouganis, G...
CLOUD
2010
ACM
14 years 19 days ago
Nephele/PACTs: a programming model and execution framework for web-scale analytical processing
We present a parallel data processor centered around a programming model of so called Parallelization Contracts (PACTs) and the scalable parallel execution engine Nephele [18]. Th...
Dominic Battré, Stephan Ewen, Fabian Hueske...