Sciweavers

680 search results - page 136 / 136
» Dynamically scaling applications in the cloud
Sort
View
CONEXT
2009
ACM
13 years 5 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
CI
2005
106views more  CI 2005»
13 years 4 months ago
Incremental Learning of Procedural Planning Knowledge in Challenging Environments
Autonomous agents that learn about their environment can be divided into two broad classes. One class of existing learners, reinforcement learners, typically employ weak learning ...
Douglas J. Pearson, John E. Laird
PRESENCE
2000
92views more  PRESENCE 2000»
13 years 4 months ago
Virtual Explorer: Interactive Virtual Environment for Education
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scie...
Kevin L. Dean, Xyler S. Asay-Davis, Evan M. Finn, ...
TON
2002
125views more  TON 2002»
13 years 4 months ago
Multicast-based inference of network-internal delay distributions
Packet delay greatly influences the overall performance of network applications. It is therefore important to identify causes and location of delay performance degradation within ...
Francesco Lo Presti, Nick G. Duffield, Joseph Horo...
INFOCOM
2010
IEEE
13 years 3 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman