Sciweavers

2968 search results - page 82 / 594
» Network Programming Using PLAN
Sort
View
PDPTA
2007
15 years 3 months ago
Web Server Traffic Characterization at the UFL College of Design, Construction, and Planning
- Our study evaluates user (Web browser) accesses to a Web server. We examine a Web server log that was collected for the span of several months at the College of Design, Construct...
Zornitza Genova Prodanoff, Karen Cano
CP
2003
Springer
15 years 7 months ago
Open Constraint Optimization
Constraint satisfaction has been applied with great success in closed-world scenarios, where all options and constraints are known from the beginning and fixed. With the internet,...
Boi Faltings, Santiago Macho-Gonzalez
105
Voted
AAAI
2012
13 years 4 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
IM
2003
15 years 3 months ago
A Revenue-based Model for Making Resource Investment Decisions in IP Networks
: Capacity planning is a critical task in network management. It identifies how much capacity is needed to match future traffic demand. It directly affects customer satisfaction ...
Srinivasan Jagannathan, Jörn Altmann, Lee Rho...
BTW
2007
Springer
142views Database» more  BTW 2007»
15 years 8 months ago
Algebraic Query Optimization for Distributed Top-k Queries
: Distributed top-k query processing is increasingly becoming an essential functionality in a large number of emerging application classes. This paper addresses the efficient alge...
Thomas Neumann, Sebastian Michel