Sciweavers

16128 search results - page 2847 / 3226
» Distributed network scheduling
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 11 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
INFOCOM
2011
IEEE
14 years 8 months ago
Consolidating virtual machines with dynamic bandwidth demand in data centers
—Recent advances in virtualization technology have made it a common practice to consolidate virtual machines(VMs) into a fewer number of servers. An efficient consolidation sche...
Meng Wang, Xiaoqiao Meng, Li Zhang 0002
ACL
2011
14 years 8 months ago
Learning From Collective Human Behavior to Introduce Diversity in Lexical Choice
We analyze collective discourse, a collective human behavior in content generation, and show that it exhibits diversity, a property of general collective systems. Using extensive ...
Vahed Qazvinian, Dragomir R. Radev
AINA
2011
IEEE
14 years 8 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
AUTOMATICA
2011
14 years 8 months ago
Fast computation of minimal elementary decompositions of metabolic flux vectors
The concept of elementary flux vector is valuable in a number of applications of metabolic engineering. For instance, in metabolic flux analysis, each admissible flux vector ca...
Raphaël M. Jungers, Francisca Zamorano, Vince...
« Prev « First page 2847 / 3226 Last » Next »