Sciweavers

1215 search results - page 186 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
EMS
2008
IEEE
14 years 11 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
IJCV
2008
188views more  IJCV 2008»
14 years 9 months ago
Partial Linear Gaussian Models for Tracking in Image Sequences Using Sequential Monte Carlo Methods
The recent development of Sequential Monte Carlo methods (also called particle filters) has enabled the definition of efficient algorithms for tracking applications in image sequen...
Elise Arnaud, Étienne Mémin
CN
2004
109views more  CN 2004»
14 years 9 months ago
Modeling correlations in web traces and implications for designing replacement policies
A number of web cache-related algorithms, such as replacement and prefetching policies, rely on specific characteristics present in the sequence of requests for efficient performa...
Konstantinos Psounis, An Zhu, Balaji Prabhakar, Ra...
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
15 years 11 months ago
Progressive Distributed Top k Retrieval in Peer-to-Peer Networks
Query processing in traditional information management systems has moved from an exact match model to more flexible paradigms allowing cooperative retrieval by aggregating the dat...
Wolf-Tilo Balke, Wolfgang Nejdl, Wolf Siberski, Uw...
NSDI
2004
14 years 11 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...