Sciweavers

10577 search results - page 1988 / 2116
» Active Data Mining
Sort
View
TON
1998
107views more  TON 1998»
15 years 4 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
TSE
1998
93views more  TSE 1998»
15 years 4 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
PE
2007
Springer
100views Optimization» more  PE 2007»
15 years 4 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
CCS
2010
ACM
15 years 4 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
ICFEM
2010
Springer
15 years 3 months ago
A Modular Scheme for Deadlock Prevention in an Object-Oriented Programming Model
Despite the advancements of concurrency theory in the past decades, practical concurrent programming has remained a challenging activity. Fundamental problems such as data races an...
Scott West, Sebastian Nanz, Bertrand Meyer
« Prev « First page 1988 / 2116 Last » Next »