Sciweavers

1479 search results - page 264 / 296
» Extremal collective behavior
Sort
View
ICCAD
2000
IEEE
119views Hardware» more  ICCAD 2000»
15 years 2 months ago
Synthesis of Operation-Centric Hardware Descriptions
Most hardware description frameworks, whether schematic or textual, use cooperating finite state machines (CFSM) as the underlying abstraction. In the CFSM framework, a designer ...
James C. Hoe, Arvind
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
15 years 2 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...
KDD
1998
ACM
190views Data Mining» more  KDD 1998»
15 years 2 months ago
Time Series Forecasting from High-Dimensional Data with Multiple Adaptive Layers
This paper describes our work in learning online models that forecast real-valued variables in a high-dimensional space. A 3GB database was collected by sampling 421 real-valued s...
R. Bharat Rao, Scott Rickard, Frans Coetzee
INFOCOM
1993
IEEE
15 years 1 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
ACSAC
2003
IEEE
15 years 1 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...