Sciweavers

1061 search results - page 163 / 213
» A general definition of malware
Sort
View
SIGMETRICS
2010
ACM
115views Hardware» more  SIGMETRICS 2010»
14 years 10 months ago
Fair greening for DSL broadband access
Given that broadband access networks are an integral part of the ICT infrastructure and that DSL is the most widely deployed broadband access technology, greening DSL has become i...
Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc M...
IMC
2010
ACM
14 years 9 months ago
Network traffic characteristics of data centers in the wild
Although there is tremendous interest in designing improved networks for data centers, very little is known about the network-level traffic characteristics of current data centers...
Theophilus Benson, Aditya Akella, David A. Maltz
PPDP
2010
Springer
14 years 9 months ago
Tabling for transaction logic
Transaction Logic is a logic for representing declarative and procedural knowledge in logic programming, databases, and AI. It has been successful in areas as diverse as workflows...
Paul Fodor, Michael Kifer
WOA
2010
14 years 9 months ago
Towards an Agent-Based Proxemic Model for Pedestrian and Group Dynamic
Models for the simulation of pedestrian dynamics and crowds of pedestrians have already been successfully applied to several scenarios and case studies, off-the-shelf simulators ca...
Lorenza Manenti, Sara Manzoni, Giuseppe Vizzari, K...
CRISIS
2009
14 years 9 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...