Sciweavers

3143 search results - page 265 / 629
» Minimization of entropy functionals
Sort
View
117
Voted
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 11 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
15 years 11 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
IMC
2006
ACM
15 years 10 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ICN
2005
Springer
15 years 10 months ago
Network Traffic Sampling Model on Packet Identification
Spatially coordinated packet sampling can be implemented by using a deterministic function of packet content to determine the selection decision for a given packet. In this way, a...
Guang Cheng, Jian Gong, Wei Ding 0001
INFOVIS
2003
IEEE
15 years 10 months ago
Exploring High-D Spaces with Multiform Matrices and Small Multiples
We introduce an approach to visual analysis of multivariate data that integrates several methods from information visualization, exploratory data analysis (EDA), and geovisualizat...
Alan M. MacEachren, Xiping Dai, Frank Hardisty, Di...