Sciweavers

3093 search results - page 613 / 619
» The Multi-perspective Process Explorer
Sort
View
SIGIR
2008
ACM
13 years 9 months ago
User adaptation: good results from poor systems
Several recent studies have found only a weak relationship between the performance of a retrieval system and the "success" achievable by human searchers. We hypothesize ...
Catherine L. Smith, Paul B. Kantor
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...
SIGMOD
2008
ACM
138views Database» more  SIGMOD 2008»
13 years 9 months ago
Configuration-parametric query optimization for physical design tuning
Automated physical design tuning for database systems has recently become an active area of research and development. Existing tuning tools explore the space of feasible solutions...
Nicolas Bruno, Rimma V. Nehme
AES
2005
Springer
137views Cryptology» more  AES 2005»
13 years 9 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang