Sciweavers

673 search results - page 92 / 135
» Request behavior variations
Sort
View
SE
2007
13 years 9 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
DMIN
2006
106views Data Mining» more  DMIN 2006»
13 years 9 months ago
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
This paper describes an effective medical claim fraud/abuse detection system based on data mining used by a Chilean private health insurance company. Fraud and abuse in medical cla...
Pedro A. Ortega, Cristián J. Figueroa, Gonz...
IM
2003
13 years 9 months ago
Performance Management for Cluster Based Web Services
: We present an architecture and prototype implementation of a performance management system for cluster-based web services. The system supports multiple classes of web services tr...
Ronald M. Levy, Jay Nagarajarao, Giovanni Pacifici...
IMAGING
2000
13 years 9 months ago
Conversion Between CMYK Spaces Preserving Black Separation
This paper describes a method for developing a transform between two device CMYK spaces in a way that preserves information about the black separation. An important application of...
Tomasz J. Cholewo
ESA
2008
Springer
102views Algorithms» more  ESA 2008»
13 years 8 months ago
RFQ: Redemptive Fair Queuing
Fair-queuing schedulers provide clients with bandwidth or latency guarantees provided they are well-behaved i.e. the requested service is always within strict predefined limits. V...
Ajay Gulati, Peter J. Varman