Sciweavers

1791 search results - page 29 / 359
» Policy-Driven Management of Data Sets
Sort
View
CLUSTER
2011
IEEE
12 years 8 months ago
A Framework for Data-Intensive Computing with Cloud Bursting
—For many organizations, one attractive use of cloud resources can be through what is referred to as cloud bursting or the hybrid cloud. These refer to scenarios where an organiz...
Tekin Bicer, David Chiu, Gagan Agrawal
INFOCOM
2010
IEEE
13 years 7 months ago
Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
SIGMOD
2011
ACM
176views Database» more  SIGMOD 2011»
12 years 11 months ago
Sharing work in keyword search over databases
An important means of allowing non-expert end-users to pose ad hoc queries — whether over single databases or data integration systems — is through keyword search. Given a set...
Marie Jacob, Zachary G. Ives
URBAN
2008
128views more  URBAN 2008»
13 years 8 months ago
Discerning landslide susceptibility using rough sets
Rough set theory has been primarily known as a mathematical approach for analysis of a vague description of objects. This paper explores the use of rough set theory to manage the ...
Pece V. Gorsevski, Piotr Jankowski
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 8 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh