Sciweavers

828 search results - page 110 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
SIGCOMM
2010
ACM
15 years 3 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...
CANDC
2004
ACM
15 years 2 months ago
The difficult interpretation of transcriptome data: the case of the GATC regulatory network
Genomic analyses on part of Escherichia coli's chromosome had suggested the existence of a GATC regulated network. This has recently been confirmed through a transcriptome an...
Alessandra Riva, Marie-Odile Delorme, Tony Chevali...
NIPS
2004
15 years 4 months ago
Maximising Sensitivity in a Spiking Network
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
Anthony J. Bell, Lucas C. Parra
SIGMETRICS
2002
ACM
128views Hardware» more  SIGMETRICS 2002»
15 years 2 months ago
High-density model for server allocation and placement
It is well known that optimal server placement is NP-hard. We present an approximate model for the case when both clients and servers are dense, and propose a simple server alloca...
Craig W. Cameron, Steven H. Low, David X. Wei
TSE
2002
71views more  TSE 2002»
15 years 2 months ago
Visualizing Software Changes
A key problem in software engineering is changing the code. We present a sequence of visualizations and visual metaphors designed to help engineers understand and manage the softw...
Stephen G. Eick, Todd L. Graves, Alan F. Karr, Aud...