Sciweavers

5684 search results - page 359 / 1137
» Computing with active dendrites
Sort
View
CONEXT
2007
ACM
15 years 9 months ago
Identifying dynamic IP address blocks serendipitously through background scanning traffic
Today's Internet contains a large portion of "dynamic" IP addresses, which are assigned to clients upon request. A significant amount of malicious activities have b...
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
EUC
2006
Springer
15 years 8 months ago
On Multiprocessor Utility Accrual Real-Time Scheduling with Statistical Timing Assurances
We present the first Utility Accrual (or UA) real-time scheduling algorithm for multiprocessors, called gMUA. The algorithm considers an application model where real-time activiti...
Hyeonjoong Cho, Haisang Wu, Binoy Ravindran, E. Do...
CCS
2008
ACM
15 years 7 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
AIPS
2006
15 years 6 months ago
Incremental Scheduling to Maximize Quality in a Dynamic Environment
We present techniques for incrementally managing schedules in domains where activities accrue quality as a function of the time and resources allocated to them and the goal is to ...
Anthony Gallagher, Terry L. Zimmerman, Stephen F. ...
ACL
2010
15 years 1 months ago
Detecting Experiences from Weblogs
Weblogs are a source of human activity knowledge comprising valuable information such as facts, opinions and personal experiences. In this paper, we propose a method for mining pe...
Keun-Chan Park, Yoonjae Jeong, Sung-Hyon Myaeng