Sciweavers

2248 search results - page 329 / 450
» Using Bayesian networks to analyze expression data
Sort
View
CCR
2011
14 years 11 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
16 years 1 months ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...
INFOCOM
1995
IEEE
15 years 7 months ago
Analysis of One-Way Reservation Algorithms
Modern high speed networks and ATM networks in particular use resource reservation as a basic means of establishing communications. One-way on-the- y reservation is a method for...
Israel Cidon, Raphael Rom, Yuval Shavitt
LISA
2007
15 years 6 months ago
Decision Support for Virtual Machine Re-Provisioning in Production Environments
Management of virtual machines (VMs) on a large scale remains a significant challenge today. We lack general and vendor-independent quantitative criteria/metrics by which to desc...
Kyrre M. Begnum, Matthew Disney, Æleen Frisc...
MOBICOM
1999
ACM
15 years 8 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas