Sciweavers

590 search results - page 114 / 118
» Security Issues in VOIP Applications
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
14 years 2 months ago
Fast and Efficient Log File Compression
Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system se...
Przemyslaw Skibinski, Jakub Swacha
AIRWEB
2007
Springer
14 years 2 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
OOPSLA
2007
Springer
14 years 2 months ago
Using early phase termination to eliminate load imbalances at barrier synchronization points
We present a new technique, early phase termination, for eliminating idle processors in parallel computations that use barrier synchronization. This technique simply terminates ea...
Martin C. Rinard
OOPSLA
2007
Springer
14 years 2 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout