Sciweavers

1917 search results - page 251 / 384
» User Model and Utility Based Power Management
Sort
View
HT
2005
ACM
14 years 2 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
GI
2004
Springer
14 years 2 months ago
A Behavioural Approach for the Coordination of Open Source Software Intermediaries
: An interesting phenomenon in the open source software (OSS) market is the evolution of intermediaries, which provide services to the OSS community. A problem of this business mod...
Heinz Lothar Grob, Frank Bensberg, Firoz Kaderali
PVLDB
2008
77views more  PVLDB 2008»
13 years 8 months ago
Towards a streaming SQL standard
This paper describes a unification of two different SQL extensions for streams and its associated semantics. We use the data models from Oracle and StreamBase as our examples. Ora...
Namit Jain, Shailendra Mishra, Anand Srinivasan, J...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 7 months ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...
INFORMS
2007
123views more  INFORMS 2007»
13 years 9 months ago
Constructing Ensembles from Data Envelopment Analysis
It has been shown in prior work in management science, statistics and machine learning that using an ensemble of models often results in better performance than using a single ‘...
Zhiqiang Zheng, Balaji Padmanabhan