Sciweavers

12697 search results - page 82 / 2540
» Call for Papers
Sort
View
INFOCOM
1994
IEEE
15 years 4 months ago
Traffic Models for Wireless Communication Networks
In this paper, we introduce a deterministic fluid model and two stochastic traffic models for wireless networks. The setting is a highway with multiple entrances and exits. Vehicl...
Kin K. Leung, William A. Massey, Ward Whitt
PAKDD
2010
ACM
175views Data Mining» more  PAKDD 2010»
15 years 3 months ago
EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs
Abstract. We report a surprising, persistent pattern in large sparse social graphs, which we term EigenSpokes. We focus on large Mobile Call graphs, spanning about 186K nodes and m...
B. Aditya Prakash, Ashwin Sridharan, Mukund Seshad...
ACSAC
2001
IEEE
15 years 3 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
ASPLOS
2008
ACM
15 years 1 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
NETWORKING
2004
15 years 1 months ago
Self-Admission Control for IP Telephony Using Early Quality Estimation
Abstract. If quality of service could be provided at the transport or the application layer, then it might be deployed simply by software upgrades, instead of requiring a complete ...
Olof Hagsand, Ignacio Más Ivars, Ian Marsh,...