Sciweavers

9588 search results - page 1687 / 1918
» Service Value Networks
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
Estimating Hop Distance Between Arbitrary Host Pairs
—Establishing a clear and timely picture of Internet topology is complicated by many factors including the vast size and dynamic nature of the infrastructure. In this paper, we d...
Brian Eriksson, Paul Barford, Robert D. Nowak
ICTAI
2008
IEEE
15 years 10 months ago
The Performance of Approximating Ordinary Differential Equations by Neural Nets
—The dynamics of many systems are described by ordinary differential equations (ODE). Solving ODEs with standard methods (i.e. numerical integration) needs a high amount of compu...
Josef Fojdl, Rüdiger W. Brause
131
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Achievable Capacity Under the Interference Temperature Model
— The Interference Temperature Model was proposed by the FCC in 2003 as a way to dynamically manage and allocate spectrum resources. It would allow unlicensed radios to sense the...
Thomas C. Clancy
135
Voted
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
15 years 10 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
NDSS
2007
IEEE
15 years 10 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
« Prev « First page 1687 / 1918 Last » Next »