Sciweavers

178 search results - page 20 / 36
» When Can I Expect an Email Response
Sort
View
CCS
2011
ACM
12 years 7 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
EMNLP
2011
12 years 7 months ago
Lateen EM: Unsupervised Training with Multiple Objectives, Applied to Dependency Grammar Induction
We present new training methods that aim to mitigate local optima and slow convergence in unsupervised training by using additional imperfect objectives. In its simplest form, lat...
Valentin I. Spitkovsky, Hiyan Alshawi, Daniel Jura...
TRIDENTCOM
2008
IEEE
14 years 1 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
CLUSTER
2005
IEEE
14 years 1 months ago
Service Level Agreement based Allocation of Cluster Resources: Handling Penalty to Enhance Utility
Jobs submitted into a cluster have varying requirements depending on user-specific needs and expectations. Therefore, in utility-driven cluster computing, cluster Resource Manage...
Chee Shin Yeo, Rajkumar Buyya
BMCBI
2007
126views more  BMCBI 2007»
13 years 7 months ago
Using gene expression data and network topology to detect substantial pathways, clusters and switches during oxygen deprivation
Background: Biochemical investigations over the last decades have elucidated an increasingly complete image of the cellular metabolism. To derive a systems view for the regulation...
Gunnar Schramm, Marc Zapatka, Roland Eils, Rainer ...