Sciweavers

1416 search results - page 208 / 284
» cost 2009
Sort
View
CEC
2010
IEEE
13 years 10 months ago
Born to trade: A genetically evolved keyword bidder for sponsored search
In sponsored search auctions, advertisers choose a set of keywords based on products they wish to market. They bid for advertising slots that will be displayed on the search result...
Michael Munsey, Jonathan Veilleux, Sindhura Bikkan...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 10 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
CIDR
2009
157views Algorithms» more  CIDR 2009»
13 years 10 months ago
SCADS: Scale-Independent Storage for Social Computing Applications
Collaborative web applications such as Facebook, Flickr and Yelp present new challenges for storing and querying large amounts of data. As users and developers are focused more on...
Michael Armbrust, Armando Fox, David A. Patterson,...
COMAD
2009
13 years 9 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
EUROPAR
2010
Springer
13 years 9 months ago
Sampling Bias in BitTorrent Measurements
Abstract. Real-world measurements play an important role in understanding the characteristics and in improving the operation of BitTorrent, which is currently a popular Internet ap...
Boxun Zhang, Alexandru Iosup, Johan A. Pouwelse, D...