Sciweavers

510 search results - page 67 / 102
» Performance Improvement Methods for NETCONF-Based Configurat...
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
ESEM
2008
ACM
13 years 10 months ago
A hybrid faulty module prediction using association rule mining and logistic regression analysis
This paper proposes a fault-prone module prediction method that combines association rule mining with logistic regression analysis. In the proposed method, we focus on three key m...
Yasutaka Kamei, Akito Monden, Shuuji Morisaki, Ken...
ANOR
2008
106views more  ANOR 2008»
13 years 9 months ago
Application of multi-dimensional procurement auction in single-period inventory models
Procurement is one of the major activities in the Manufacturing Resource Planning (MRP II), which is closely coupled with inventory management. Any improvement in this area will h...
Pooya Farahvash, Tayfur Altiok
VL
1995
IEEE
121views Visual Languages» more  VL 1995»
14 years 18 days ago
Buffering of Intermediate Results in Dataflow Diagrams
Buffering of intermediate results in dataflow diagrams can significantly reduce latency when a user browses these results or re-executes a diagram with slightly different inputs. ...
Allison Woodruff, Michael Stonebraker
SIGIR
2010
ACM
14 years 29 days ago
Linking wikipedia to the web
We investigate the task of finding links from Wikipedia pages to external web pages. Such external links significantly extend the information in Wikipedia with information from ...
Rianne Kaptein, Pavel Serdyukov, Jaap Kamps