Sciweavers

3637 search results - page 692 / 728
» Application of Network Calculus to Guaranteed Service Networ...
Sort
View
TPDS
1998
122views more  TPDS 1998»
15 years 1 months ago
Managing Statistical Behavior of Large Data Sets in Shared-Nothing Architectures
—Increasingly larger data sets are being stored in networked architectures. Many of the available data structures are not easily amenable to parallel realizations. Hashing scheme...
Isidore Rigoutsos, Alex Delis
SIGMETRICS
2011
ACM
208views Hardware» more  SIGMETRICS 2011»
14 years 4 months ago
Structure-aware sampling on data streams
The massive data streams observed in network monitoring, data processing and scientific studies are typically too large to store. For many applications over such data, we must ob...
Edith Cohen, Graham Cormode, Nick G. Duffield
POPL
2012
ACM
13 years 9 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
108
Voted
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 8 months ago
Evidences Behind Skype Outage
—Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructur...
Dario Rossi, Marco Mellia, Michela Meo
115
Voted
CEC
2008
IEEE
15 years 8 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith