Sciweavers

655 search results - page 116 / 131
» A behavioral approach to worm detection
Sort
View
LCN
2002
IEEE
15 years 2 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung
VISUALIZATION
2002
IEEE
15 years 2 months ago
Exploring Scalar Fields Using Critical Isovalues
Isosurfaces are commonly used to visualize scalar fields. Critical isovalues indicate isosurface topology changes: the creation of new surface components, merging of surface comp...
Gunther H. Weber, Gerik Scheuermann, Hans Hagen, B...
ICPP
1993
IEEE
15 years 1 months ago
A Unified Model for Concurrent Debugging
: Events are occurrence instances of actions. The thesis of this paper is that the use of “actions”, instead of events, greatly simplifies the problem of concurrent debugging....
S. I. Hyder, John Werth, James C. Browne
EUROMICRO
2004
IEEE
15 years 1 months ago
An Experimental Framework for Testing Web Prefetching Techniques
The popularity of web objects, and by extension the popularity of the web sites, besides the appearance of clear footprints in user's accesses that show a considerable spatia...
Josep Domènech, Ana Pont, Julio Sahuquillo,...
EDBTW
2006
Springer
15 years 1 months ago
Context Consistency Management Using Ontology Based Model
Abstract. Inconsistent contexts are death-wounds which usually result in contextaware applications' incongruous behaviors and users' perplexed feelings, therefore the ben...
Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian...