Sciweavers

1411 search results - page 218 / 283
» Performance analysis of BitTorrent-like systems with heterog...
Sort
View
EUROSYS
2008
ACM
14 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
VLDB
1993
ACM
116views Database» more  VLDB 1993»
14 years 1 months ago
Algebraic Optimization of Computations over Scientific Databases
Although scientific data analysis increasingly requires accessandmanipulation of large quantitiesof data,current databasetechnology fails to meet the needsof scientific processing...
Richard H. Wolniewicz, Goetz Graefe
VISUALIZATION
2005
IEEE
14 years 2 months ago
Query-Driven Visualization of Large Data Sets
We present a practical and general-purpose approach to large and complex visual data analysis where visualization processing, rendering and subsequent human interpretation is cons...
Kurt Stockinger, John Shalf, Kesheng Wu, E. Wes Be...
SIGIR
2009
ACM
14 years 3 months ago
Multiple approaches to analysing query diversity
In this paper we examine user queries with respect to diversity: providing a mix of results across different interpretations. Using two query log analysis techniques (click entrop...
Paul Clough, Mark Sanderson, Murad Abouammoh, Serg...
VALUETOOLS
2006
ACM
166views Hardware» more  VALUETOOLS 2006»
14 years 3 months ago
Web graph analyzer tool
We present the software tool “Web Graph Analyzer”. This tool is designed to perform a comprehensive analysis of the Web Graph structure. By Web Graph we mean a graph whose ver...
Konstantin Avrachenkov, Danil Nemirovsky, Natalia ...