Sciweavers

338 search results - page 56 / 68
» Semi-Symbolic Modeling and Analysis of Noise in Heterogeneou...
Sort
View
GLOBECOM
2009
IEEE
15 years 2 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
EMSOFT
2007
Springer
15 years 4 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
IJON
1998
158views more  IJON 1998»
14 years 10 months ago
Bayesian Kullback Ying-Yang dependence reduction theory
Bayesian Kullback Ying—Yang dependence reduction system and theory is presented. Via stochastic approximation, implementable algorithms and criteria are given for parameter lear...
Lei Xu
IPTPS
2005
Springer
15 years 4 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
BMCBI
2007
130views more  BMCBI 2007»
14 years 10 months ago
A model-based optimization framework for the inference of regulatory interactions using time-course DNA microarray expression da
Background: Proteins are the primary regulatory agents of transcription even though mRNA expression data alone, from systems like DNA microarrays, are widely used. In addition, th...
Reuben Thomas, Carlos J. Paredes, Sanjay Mehrotra,...