Sciweavers

1356 search results - page 203 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SRDS
2006
IEEE
14 years 2 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
INFOCOM
2007
IEEE
14 years 2 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
BMCBI
2007
109views more  BMCBI 2007»
13 years 8 months ago
A domain-based approach to predict protein-protein interactions
Background: Knowing which proteins exist in a certain organism or cell type and how these proteins interact with each other are necessary for the understanding of biological proce...
Mudita Singhal, Haluk Resat
IMC
2006
ACM
14 years 2 months ago
Comprehensive view of a live network coding P2P system
In this paper we present the first implementation of a P2P content distribution system that uses Network Coding. Using results from live trials with several hundred nodes, we pro...
Christos Gkantsidis, John Miller, Pablo Rodriguez
CASES
2007
ACM
14 years 19 hour ago
Eliminating inter-process cache interference through cache reconfigurability for real-time and low-power embedded multi-tasking
We propose a technique which leverages configurable data caches to address the problem of cache interference in multitasking embedded systems. Data caches are often necessary to p...
Rakesh Reddy, Peter Petrov