Sciweavers

2500 search results - page 360 / 500
» Specifying Behavior in C
Sort
View
126
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Understanding TCP incast throughput collapse in datacenter networks
TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patt...
Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Ka...
112
Voted
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
ACSAC
2008
IEEE
15 years 10 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
AINA
2008
IEEE
15 years 10 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
CISIS
2008
IEEE
15 years 10 months ago
Adaptive Computational Chemotaxis in Bacterial Foraging Algorithm
Some researchers have illustrated how individual and groups of bacteria forage for nutrients and to model it as a distributed optimization process, which is called the Bacterial F...
Sambarta Dasgupta, Arijit Biswas, Ajith Abraham, S...