Sciweavers

12052 search results - page 2129 / 2411
» computer 2010
Sort
View
108
Voted
IMC
2010
ACM
14 years 10 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
110
Voted
IMC
2010
ACM
14 years 10 months ago
High speed network traffic analysis with commodity multi-core systems
Multi-core systems are the current dominant trend in computer processors. However, kernel network layers often do not fully exploit multi-core architectures. This is due to issues...
Francesco Fusco, Luca Deri
IMC
2010
ACM
14 years 10 months ago
Challenges in measuring online advertising systems
Online advertising supports many Internet services, such as search, email, and social networks. At the same time, there are widespread concerns about the privacy loss associated w...
Saikat Guha, Bin Cheng, Paul Francis
104
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks
Abstract--Achieving fast, precise, and scalable fault localization has long been a highly desired feature in all-optical mesh networks. Monitoring tree (m-tree) is an interesting m...
János Tapolcai, Lajos Rónyai, Pin-Ha...
ISAAC
2010
Springer
253views Algorithms» more  ISAAC 2010»
14 years 10 months ago
Solving Two-Stage Stochastic Steiner Tree Problems by Two-Stage Branch-and-Cut
Abstract. We consider the Steiner tree problem under a 2-stage stochastic model with recourse and finitely many scenarios (SSTP). Thereby, edges are purchased in the first stage wh...
Immanuel M. Bomze, Markus Chimani, Michael Jü...
« Prev « First page 2129 / 2411 Last » Next »