Sciweavers

8881 search results - page 1670 / 1777
» Active Data Clustering
Sort
View
INFOCOM
2007
IEEE
15 years 4 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
LANOMS
2007
IEEE
172views Education» more  LANOMS 2007»
15 years 4 months ago
Implementing and Deploying Network Monitoring Service Oriented Architectures
—Recently there is a growing interest in accessing network measurement and status data across multiple domains, in order to detect eventual network problems which can hinder the ...
Leobino Nascimento Sampaio, Ivo Koga, Rafael Costa...
AIED
2007
Springer
15 years 4 months ago
Assessing Learning in a Peer-Driven Tutoring System
In many intelligent tutoring systems, a detailed model of the task domain is constructed and used to provide students with assistance and direction. Reciprocal tutoring systems, h...
Ari Bader-Natal, Jordan B. Pollack
IWMM
2007
Springer
116views Hardware» more  IWMM 2007»
15 years 4 months ago
Heap space analysis for java bytecode
This article presents a heap space analysis for (sequential) Java bytecode. The analysis generates heap space cost relations which define at compile-time the heap consumption of ...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
MINENET
2006
ACM
15 years 3 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
« Prev « First page 1670 / 1777 Last » Next »