Sciweavers

3515 search results - page 45 / 703
» Resource usage analysis
Sort
View
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
JSSPP
1997
Springer
14 years 19 days ago
Memory Usage in the LANL CM-5 Workload
It is generally agreed that memory requirements should be taken into account in the scheduling of parallel jobs. However, so far the work on combined processor and memory schedulin...
Dror G. Feitelson
INFOCOM
2010
IEEE
13 years 7 months ago
On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks
—While there has been much progress in designing backpressure based stabilizing algorithms for multihop wireless networks, end-to-end performance (e.g., end-to-end buffer usage) ...
V. J. Venkataramanan, Xiaojun Lin, Lei Ying, Sanja...
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
13 years 10 months ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou
HCI
2009
13 years 6 months ago
Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies
This paper describes our work in developing a movie browser application for students of Film Studies at our University. The aim of our work is to address the issues that arise when...
Nazlena Mohamad Ali, Alan F. Smeaton, Hyowon Lee, ...