Sciweavers

4983 search results - page 769 / 997
» order 2008
Sort
View
FLAIRS
2008
15 years 6 months ago
Unsupervised Approach for Selecting Sentences in Query-based Summarization
When a user is served with a ranked list of relevant documents by the standard document search engines, his search task is usually not over. He has to go through the entire docume...
Yllias Chali, Shafiq R. Joty
NSDI
2008
15 years 6 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
NSDI
2008
15 years 6 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
USS
2008
15 years 6 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
WSC
2008
15 years 6 months ago
SR-1: A simulation-based algorithm for the Capacitated Vehicle Routing Problem
In this paper we present SR-1, a simulation-based heuristic algorithm for the Capacitated Vehicle Routing Problem (CVRP). Given a CVRP instance, SR-1 uses an initial "good so...
Javier Faulin, Miquel Gilibert, Angel A. Juan, Xav...