Sciweavers

182 search results - page 22 / 37
» Turing's Analysis of Computation and Theories of Cognitive A...
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 5 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
OZCHI
2006
ACM
14 years 1 months ago
InfoScent evaluator: a semi-automated tool to evaluate semantic appropriateness of hyperlinks in a web site
In this paper, we present InfoScent Evaluator, a tool that automatically evaluates the semantic appropriateness of the descriptions of hyperlinks in web pages. The tool is based o...
Christos Katsanos, Nikolaos K. Tselios, Nikolaos M...
DAC
2010
ACM
13 years 10 months ago
On the costs and benefits of stochasticity in stream processing
With the end of clock-frequency scaling, parallelism has emerged as the key driver of chip-performance growth. Yet, several factors undermine efficient simultaneous use of onchip ...
Raj R. Nadakuditi, Igor L. Markov
MOBIHOC
2007
ACM
14 years 7 months ago
Approximation algorithms for longest-lived directional multicast communications in WANETs
Several centralized and distributed algorithms have been recently proposed to maximize the multicast lifetime for directional communications in wireless ad-hoc networks. Their per...
Song Guo, Oliver W. W. Yang, Victor C. M. Leung
SPAA
2004
ACM
14 years 24 days ago
Online algorithms for network design
This paper presents the first polylogarithmic-competitive online algorithms for two-metric network design problems. These problems arise naturally in the design of computer netwo...
Adam Meyerson