Sciweavers

5977 search results - page 1076 / 1196
» Hierarchical Performance Modeling for Distributed System Arc...
Sort
View
IMC
2009
ACM
15 years 11 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
IEEEPACT
2003
IEEE
15 years 9 months ago
Constraint Graph Analysis of Multithreaded Programs
This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions fo...
Harold W. Cain, Mikko H. Lipasti, Ravi Nair
GIS
2004
ACM
16 years 5 months ago
Supporting spatial aggregation in sensor network databases
Sensor networks are unattended deeply distributed systems whose schema can be conceptualized using the relational model. Aggregation queries on the data sampled at each ode are th...
Mehdi Sharifzadeh, Cyrus Shahabi
PODC
2006
ACM
15 years 10 months ago
Sketching asynchronous streams over a sliding window
We study the problem of maintaining sketches of recent elements of a data stream. Motivated by applications involving network data, we consider streams that are asynchronous, in w...
Srikanta Tirthapura, Bojian Xu, Costas Busch
MM
2005
ACM
118views Multimedia» more  MM 2005»
15 years 10 months ago
Supporting multi-party voice-over-IP services with peer-to-peer stream processing
Multi-party voice-over-IP (MVoIP) services provide economical and natural group communication mechanisms for many emerging applications such as on-line gaming, distance collaborat...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
« Prev « First page 1076 / 1196 Last » Next »