Sciweavers

3225 search results - page 511 / 645
» Measures of Similarity
Sort
View
ICC
2008
IEEE
130views Communications» more  ICC 2008»
15 years 8 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
ICDM
2008
IEEE
172views Data Mining» more  ICDM 2008»
15 years 8 months ago
Latent Dirichlet Allocation and Singular Value Decomposition Based Multi-document Summarization
Multi-Document Summarization deals with computing a summary for a set of related articles such that they give the user a general view about the events. One of the objectives is th...
Rachit Arora, Balaraman Ravindran
ISCC
2008
IEEE
122views Communications» more  ISCC 2008»
15 years 8 months ago
A flexible network monitoring tool based on a data stream management system
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper describes a flexible network monitoring tool, called Pa...
Natascha Petry Ligocki, Carmem S. Hara, Christiano...
102
Voted
BROADNETS
2007
IEEE
15 years 8 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...
95
Voted
DATE
2007
IEEE
103views Hardware» more  DATE 2007»
15 years 8 months ago
Flexible hardware reduction for elliptic curve cryptography in GF(2m)
In this paper we discuss two ways to provide flexible hardware support for the reduction step in Elliptic Curve Cryptography in binary fields (GF(2m )). In our first approach w...
Steffen Peter, Peter Langendörfer, Krzysztof ...