Sciweavers

1718 search results - page 336 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 6 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
CCS
2005
ACM
14 years 1 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
14 years 23 days ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
ICSE
2003
IEEE-ACM
14 years 22 days ago
A Tutorial on Feature Oriented Programming and Product-Lines
ct Feature Oriented Programming (FOP) is a design methodology and tools for program synthesis. The goal is to specify a target program in terms of the features that it offers, and ...
Don S. Batory
INFOCOM
2006
IEEE
14 years 1 months ago
Mistreatment in Distributed Caching Groups: Causes and Implications
— Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the...
Nikolaos Laoutaris, Georgios Smaragdakis, Azer Bes...