Sciweavers

9503 search results - page 1891 / 1901
» Authenticated System Calls
Sort
View
JLP
2010
96views more  JLP 2010»
13 years 4 months ago
An overview of the K semantic framework
K is an executable semantic framework in which programming languages, calculi, as well as type systems or formal analysis tools can be defined making use of configurations, comput...
Grigore Rosu, Traian-Florin Serbanuta
NETWORK
2010
153views more  NETWORK 2010»
13 years 4 months ago
Sizing up online social networks
While the size of popular Online Social Networks (OSNs) such as MySpace or Twitter has been reported to be in the tens or hundreds of millions of users (and growing), little is kn...
Reza Rejaie, Mojtaba Torkjazi, Masoud Valafar, Wal...
TON
2010
167views more  TON 2010»
13 years 4 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
ICASSP
2011
IEEE
13 years 1 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 1 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...
« Prev « First page 1891 / 1901 Last » Next »