Sciweavers

722 search results - page 131 / 145
» Measurement Analysis of IP-Based Process Control Networks
Sort
View
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
IMC
2009
ACM
15 years 4 months ago
IXPs: mapped?
Internet exchange points (IXPs) are an important ingredient of the Internet AS-level ecosystem—a logical fabric of the Internet made up of about 30,000 ASes and their mutual bus...
Brice Augustin, Balachander Krishnamurthy, Walter ...
CCR
2004
90views more  CCR 2004»
14 years 9 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
72
Voted
BMCBI
2007
105views more  BMCBI 2007»
14 years 9 months ago
Text-derived concept profiles support assessment of DNA microarray data for acute myeloid leukemia and for androgen receptor sti
Background: High-throughput experiments, such as with DNA microarrays, typically result in hundreds of genes potentially relevant to the process under study, rendering the interpr...
Rob Jelier, Guido Jenster, Lambert C. J. Dorssers,...