Sciweavers

2912 search results - page 457 / 583
» Overlay Networks - Implementation by Specification
Sort
View
BMCBI
2004
88views more  BMCBI 2004»
15 years 4 months ago
Coronavirus 3CLpro proteinase cleavage sites: Possible relevance to SARS virus pathology
Background: Despite the passing of more than a year since the first outbreak of Severe Acute Respiratory Syndrome (SARS), efficient counter-measures are still few and many believe...
Lars Kiemer, Ole Lund, Søren Brunak, Nikola...
178
Voted
SCP
2000
119views more  SCP 2000»
15 years 4 months ago
Automated compositional Markov chain generation for a plain-old telephone system
Obtaining performance models, like Markov chains and queueing networks, for systems of significant complexity and magnitude is a difficult task that is usually tackled using human...
Holger Hermanns, Joost-Pieter Katoen
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
16 years 5 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
OSDI
2004
ACM
16 years 4 months ago
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. We observe that wide-area services, such as peerto-peer systems an...
Ming Zhang, Chi Zhang, Vivek S. Pai, Larry L. Pete...
ANCS
2006
ACM
15 years 10 months ago
Advanced algorithms for fast and scalable deep packet inspection
Modern deep packet inspection systems use regular expressions to define various patterns of interest in network data streams. Deterministic Finite Automata (DFA) are commonly used...
Sailesh Kumar, Jonathan S. Turner, John Williams