Search
Now showing items 1-6 of 6
Information Theoretic Approach To Extractive Text Summarization
(2009-04-13)
Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ...
Performance Modeling And Evaluation Of Network Processors
(2009-03-02)
In recent years there has been an exponential growth in Internet traffic resulting in increased network bandwidth requirements which, in turn, has led to stringent processing requirements on network layer devices like ...
On The Issues Of Supporting On-Demand Streaming Application Over Peer-to-Peer Networks
(2009-06-17)
Bandwidth and resource constraints at the server side is a limitation for deployment of streaming media applications. Resource constraints at the server side often leads to saturation of resources during sudden increase ...
Reduction Of Query Optimizer Plan Diagrams
(2009-06-17)
Modern database systems use a query optimizer to identify the most efficient strategy, called "plan", to execute declarative SQL queries. Optimization is a mandatory exercise since the difference between the cost of best ...
Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems
(2009-04-13)
Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...
Applications Of Machine Learning To Anomaly Based Intrusion Detection
(2009-03-02)
This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...