Sciweavers

1791 search results - page 186 / 359
» Behavioral Operations
Sort
View
INFOCOM
2011
IEEE
14 years 7 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
ECCTD
2011
108views more  ECCTD 2011»
14 years 3 months ago
Low complexity least-squares filter design for the correction of linear time-varying systems
Abstract—In this paper, a low complexity algorithm for the design of a time-varying correction filter of finite impulse response (FIR) type is presented. Using the obtained fi...
Michael Soudan, Christian Vogel
SIGCOMM
2012
ACM
13 years 6 months ago
RaptorStream: boosting mobile peer-to-peer streaming with raptor codes
As mobile devices and cellular networks become ubiquitous, first apps for popular P2P video streaming networks emerge. We have observed that when these applications operate in ce...
Philipp M. Eittenberger
AAAI
2012
13 years 6 months ago
An Intelligent Battery Controller Using Bias-Corrected Q-learning
The transition to renewables requires storage to help smooth short-term variations in energy from wind and solar sources, as well as to respond to spikes in electricity spot price...
Donghun Lee, Warren B. Powell
121
Voted
DDECS
2007
IEEE
93views Hardware» more  DDECS 2007»
15 years 10 months ago
Manifestation of Precharge Faults in High Speed DRAM Devices
Abstract: High speed DRAMs today suffer from an increased sensitivity to interference and noise problems. Signal integrity issues, caused by bit line and word line coupling, result...
Zaid Al-Ars, Said Hamdioui, Georgi Gaydadjiev