Sciweavers

267 search results - page 47 / 54
» Credal Networks for Operational Risk Measurement and Managem...
Sort
View
WORM
2004
15 years 1 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
CONEXT
2008
ACM
15 years 1 months ago
Observing slow crustal movement in residential user traffic
It is often argued that rapidly increasing video content along with the penetration of high-speed access is leading to explosive growth in the Internet traffic. Contrary to this p...
Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira ...
CCS
2009
ACM
15 years 6 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
MM
2010
ACM
137views Multimedia» more  MM 2010»
14 years 12 months ago
Self-diagnostic peer-assisted video streaming through a learning framework
Quality control and resource optimization are challenging problems in peer-assisted video streaming systems, due to their large scales and unreliable peer behavior. Such systems a...
Di Niu, Baochun Li, Shuqiao Zhao
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
13 years 2 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li