Sciweavers

1973 search results - page 378 / 395
» Network Performance Assessment for Neurofuzzy Data Modelling
Sort
View
103
Voted
ESEM
2010
ACM
14 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
DAC
2006
ACM
15 years 11 months ago
Prediction-based flow control for network-on-chip traffic
Networks-on-Chip (NoC) architectures provide a scalable solution to on-chip communication problem but the bandwidth offered by NoCs can be utilized efficiently only in presence of...
Ümit Y. Ogras, Radu Marculescu
CCR
2008
110views more  CCR 2008»
14 years 10 months ago
Operational comparison of available bandwidth estimation tools
The available bandwidth of a path directly impacts the performance of throughput sensitive applications, e.g., p2p content replication or podcasting. Several tools have been devis...
Guillaume Urvoy-Keller, Taoufik En-Najjary, Alessa...
SIGCOMM
2003
ACM
15 years 3 months ago
A comparison of hard-state and soft-state signaling protocols
One of the key infrastructure components in all telecommunication networks, ranging from the telephone network, to VC-oriented data networks, to the Internet, is its signaling sys...
Ping Ji, Zihui Ge, James F. Kurose, Donald F. Tows...
AAAI
2010
14 years 11 months ago
Informed Lifting for Message-Passing
Lifted inference, handling whole sets of indistinguishable objects together, is critical to the effective application of probabilistic relational models to realistic real world ta...
Kristian Kersting, Youssef El Massaoudi, Fabian Ha...