Sciweavers

6388 search results - page 1137 / 1278
» High Performance Data Mining
Sort
View
132
Voted
INFOCOM
2000
IEEE
15 years 9 months ago
Admission Control Based on End-to-End Measurements
— This paper proposes a controlled-load service that provides a network state with bounded and well known worst-case behavior. The service is primarily developed for real-time ap...
Viktória Elek, Gunnar Karlsson, Robert R&ou...
INFOCOM
2000
IEEE
15 years 9 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
15 years 9 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
AGENTS
2000
Springer
15 years 9 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
131
Voted
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 9 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
« Prev « First page 1137 / 1278 Last » Next »