Sciweavers

2805 search results - page 466 / 561
» Collecting More Garbage
Sort
View
TPDS
2008
78views more  TPDS 2008»
15 years 4 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
JSAC
2007
104views more  JSAC 2007»
15 years 4 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
UMUAI
2008
192views more  UMUAI 2008»
15 years 4 months ago
Automatic detection of learner's affect from conversational cues
We explored the reliability of detecting a learner's affect from conversational features extracted from interactions with AutoTutor, an intelligent tutoring system that helps...
Sidney K. D'Mello, Scotty D. Craig, Amy M. Withers...
CN
2004
119views more  CN 2004»
15 years 4 months ago
On characterizing BGP routing table growth
The sizes of the BGP routing tables have increased by an order of magnitude over the last six years. This dramatic growth of the routing table can decrease the packet forwarding sp...
Tian Bu, Lixin Gao, Donald F. Towsley
BMCBI
2002
120views more  BMCBI 2002»
15 years 4 months ago
tacg - a grep for DNA
Background: Pattern matching is the core of bioinformatics; it is used in database searching, restriction enzyme mapping, and finding open reading frames. It is done repeatedly ov...
Harry Mangalam