Sciweavers

2715 search results - page 415 / 543
» Network bucket testing
Sort
View
ECIR
2004
Springer
13 years 10 months ago
Performance Analysis of Distributed Architectures to Index One Terabyte of Text
We simulate different architectures of a distributed Information Retrieval system on a very large Web collection, in order to work out the optimal setting for a particular set of r...
Fidel Cacheda, Vassilis Plachouras, Iadh Ounis
ECIS
2004
13 years 10 months ago
Mobile telecommunications market innovation: the transformation from 2g to 3g
Current research focuses on the dynamics of mobile telecommunications market innovation from the perspectives of technology innovation or service adoption. However,because there i...
Jan Damsgaard, Ping Gao
DMIN
2006
122views Data Mining» more  DMIN 2006»
13 years 10 months ago
Cost-Sensitive Analysis in Multiple Time Series Prediction
- In this paper we propose a new methodology for Cost-Benefit analysis in a multiple time series prediction problem. The proposed model is evaluated in a real world application bas...
Chamila Walgampaya, Mehmed M. Kantardzic
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 10 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
IADIS
2003
13 years 10 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel