Sciweavers

739 search results - page 26 / 148
» Resources for Evaluation of Summarization Techniques
Sort
View
IWIA
2003
IEEE
14 years 18 days ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
METRICS
2005
IEEE
14 years 28 days ago
Software, Performance and Resource Utilisation Metrics for Context-Aware Mobile Applications
As mobile applications become more pervasive, the need for assessing their quality, particularly in terms of efficiency (i.e. performance and resource utilisation), increases. Alt...
Caspar Ryan, Pablo Rossi
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 1 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
CCR
2008
101views more  CCR 2008»
13 years 7 months ago
Empirical evaluation of hash functions for multipoint measurements
A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the p...
Christian Henke, Carsten Schmoll, Tanja Zseby
SC
2004
ACM
14 years 23 days ago
Resource Management for Rapid Application Turnaround on Enterprise Desktop Grids
Desktop grids are popular platforms for high throughput applications, but due their inherent resource volatility it is difficult to exploit them for applications that require rap...
Derrick Kondo, Andrew A. Chien, Henri Casanova