Sciweavers

733 search results - page 35 / 147
» Measurements, Analysis, and Modeling of BitTorrent-like Syst...
Sort
View
TECS
2008
122views more  TECS 2008»
15 years 1 months ago
Quantitative analysis of the speed/accuracy trade-off in transaction level modeling
tion. Transaction Level Modeling (TLM) has been proposed to abstract communication for highspeed system simulation and rapid design space exploration. Although being widely accepte...
Gunar Schirner, Rainer Dömer
KDD
2008
ACM
121views Data Mining» more  KDD 2008»
16 years 1 months ago
Reconstructing chemical reaction networks: data mining meets system identification
We present an approach to reconstructing chemical reaction networks from time series measurements of the concentrations of the molecules involved. Our solution strategy combines t...
Yong Ju Cho, Naren Ramakrishnan, Yang Cao
SIGADA
2004
Springer
15 years 6 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
MICCAI
2005
Springer
16 years 2 months ago
Physiological System Identification with the Kalman Filter in Diffuse Optical Tomography
Abstract. Diffuse optical tomography (DOT) is a noninvasive imaging technology that is sensitive to local concentration changes in oxyand deoxyhemoglobin. When applied to functiona...
Solomon Gilbert Diamond, Theodore J. Huppert, Vill...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 8 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li