Sciweavers

53390 search results - page 10633 / 10678
» Computer Systems Analysis
Sort
View
125
Voted
WORM
2004
15 years 3 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
WSPI
2004
15 years 3 months ago
Knowledge Relativity
Abstract. I introduce the notion of knowledge relativity as a proposed conceptual link between different scientific disciplines. Examples from Informatics and Philosophy, particula...
Oliver Hoffmann
AAAI
1998
15 years 3 months ago
Producing BT's Yellow Pages with Formation
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...
AAAI
2000
15 years 3 months ago
Recognizing End-User Transactions in Performance Management
Providing good quality of service (e.g., low response times) in distributed computer systems requires measuring enduser perceptions of performance. Unfortunately, such measures ar...
Joseph L. Hellerstein, T. S. Jayram, Irina Rish
135
Voted
SIMVIS
2003
15 years 3 months ago
An Experimental Study of the Behaviour of the Proxel-Based Simulation Algorithm
The paradigm of the proxel ("probability element") was recently introduced in order to provide a new algorithmic approach to analysing discrete-state stochastic models s...
Sanja Lazarova-Molnar, Graham Horton
« Prev « First page 10633 / 10678 Last » Next »