Sciweavers

3657 search results - page 571 / 732
» A Study of Practical Deduplication
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
14 years 10 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
AUTOMATICA
2002
124views more  AUTOMATICA 2002»
14 years 10 months ago
Stabilizing underwater vehicle motion using internal rotors
As a case study of a particular control methodology and as a practical contribution in the area of underwater vehicle control, we consider the problem of stabilizing an underwater...
Craig A. Woolsey, Naomi Ehrich Leonard
CN
2004
122views more  CN 2004»
14 years 10 months ago
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
This paper is a summary of the BBN Technical Report No. 8333, "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks." In this study we di...
Rajesh Krishnan, James P. G. Sterbenz, Wesley M. E...
CN
2004
67views more  CN 2004»
14 years 10 months ago
Scalable service differentiation using purely end-to-end mechanisms: features and limitations
Abstract-We investigate schemes for achieving service differentiation via weighted end-to-end congestion control mechanisms within the framework of the additive increase/multiplica...
Thyagarajan Nandagopal, Kang-Won Lee, Jia-Ru Li, V...
CN
2004
109views more  CN 2004»
14 years 10 months ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...