Sciweavers

3400 search results - page 588 / 680
» tools 2008
Sort
View
SIGIR
2008
ACM
15 years 5 months ago
Social tag prediction
In this paper, we look at the "social tag prediction" problem. Given a set of objects, and a set of tags applied to those objects by users, can we predict whether a give...
Paul Heymann, Daniel Ramage, Hector Garcia-Molina
SIGMETRICS
2008
ACM
15 years 5 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 5 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SIGMETRICS
2008
ACM
144views Hardware» more  SIGMETRICS 2008»
15 years 5 months ago
Co-designing the failure analysis and monitoring of large-scale systems
Large-scale distributed systems provide the backbone for numerous distributed applications and online services. These systems span over a multitude of computing nodes located at d...
Abhishek Chandra, Rohini Prinja, Sourabh Jain, Zhi...
SIGMETRICS
2008
ACM
15 years 5 months ago
Long range mutual information
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...
Nahur Fonseca, Mark Crovella, Kavé Salamati...