Sciweavers

3463 search results - page 656 / 693
» Modeling and executing master-worker applications in compone...
Sort
View
TON
2002
125views more  TON 2002»
14 years 9 months ago
Multicast-based inference of network-internal delay distributions
Packet delay greatly influences the overall performance of network applications. It is therefore important to identify causes and location of delay performance degradation within ...
Francesco Lo Presti, Nick G. Duffield, Joseph Horo...
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
SIAMAM
2010
119views more  SIAMAM 2010»
14 years 8 months ago
The Dynamics of Weakly Reversible Population Processes near Facets
This paper concerns the dynamical behavior of weakly reversible, deterministically modeled population processes near the facets (codimension-one faces) of their invariant manifolds...
David F. Anderson, Anne Shiu
ACSAC
2010
IEEE
14 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
CSMR
2010
IEEE
14 years 4 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski