Sciweavers

2025 search results - page 354 / 405
» On the Utility of Inference Mechanisms
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Semantic Retrieval with Enhanced Matchmaking and Multi-Modality Ontology
This paper presents a method for automatically annotating and retrieving animal images. Our model is a multi-modality ontology extended from our previous works in the sense that b...
Huan Wang, Liang-Tien Chia, Song Liu
ISCA
2006
IEEE
138views Hardware» more  ISCA 2006»
14 years 1 months ago
Learning-Based SMT Processor Resource Distribution via Hill-Climbing
The key to high performance in Simultaneous Multithreaded (SMT) processors lies in optimizing the distribution of shared resources to active threads. Existing resource distributio...
Seungryul Choi, Donald Yeung
WIKIS
2006
ACM
14 years 1 months ago
WikiTrails: augmenting Wiki structure for collaborative, interdisciplinary learning
Wikis are currently in high demand in a large variety of fields, due to their simplicity and flexible nature. Documentation, reporting, project management, online glossaries and d...
Silvan Reinhold
TLCA
2005
Springer
14 years 1 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...