Sciweavers

1791 search results - page 264 / 359
» Behavioral Operations
Sort
View
WSC
2007
15 years 5 months ago
Reflective simulation for on-line workload planning and control
Since its beginning, simulation has been used to study complex systems in order to infer on their future behavior, in this field several applications have been made using it as of...
Roberto Revetria, Flavio Tonelli
WSC
2008
15 years 5 months ago
Better than a petaflop: The power of efficient experimental design
Recent advances in high-performance computing have pushed computational capabilities to a petaflop (a thousand trillion operations per second) in a single computing cluster. This ...
Susan M. Sanchez
CEAS
2008
Springer
15 years 5 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
APSCC
2006
IEEE
15 years 5 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
CONEXT
2008
ACM
15 years 5 months ago
Internet traffic classification demystified: myths, caveats, and the best practices
Recent research on Internet traffic classification algorithms has yielded a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the ...
Hyunchul Kim, Kimberly C. Claffy, Marina Fomenkov,...