Sciweavers

2124 search results - page 400 / 425
» Aggregating time partitions
Sort
View
JMLR
2006
113views more  JMLR 2006»
14 years 11 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
14 years 11 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
PE
2008
Springer
173views Optimization» more  PE 2008»
14 years 11 months ago
Improving fairness in a WRED-based DiffServ network: A fluid-flow approach
The DiffServ architecture has been proposed as a scalable approach for upgrading the Internet, adding service differentiation functionalities. However, several aspects of this arc...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...
SIGMETRICS
2008
ACM
116views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Optimal sampling in state space models with applications to network monitoring
Advances in networking technology have enabled network engineers to use sampled data from routers to estimate network flow volumes and track them over time. However, low sampling ...
Harsh Singhal, George Michailidis
NN
2000
Springer
134views Neural Networks» more  NN 2000»
14 years 11 months ago
Generic modeling of chemotactic based self-wiring of neural networks
The proper functioning of the nervous system depends critically on the intricate network of synaptic connections that are generated during the system development. During the netwo...
Ronen Segev, Eshel Ben-Jacob