Sciweavers

2269 search results - page 439 / 454
» Behavioral Intrusion Detection
Sort
View
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
14 years 4 months ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 4 months ago
Applying Techniques from Frame Synchronization for Biological Sequence Analysis
— During the last years, the amount of genetic data available has increased rapidly which creates the demand for advanced techniques for their interpretation. In the following, w...
Johanna Weindl, Joachim Hagenauer
ICPP
2007
IEEE
14 years 4 months ago
Multi-Layer Event Trace Analysis for Parallel I/O Performance Tuning
The complexity of parallel I/O systems lies in the deep I/O stack with many software layers and concurrent I/O request handling at multiple layers. This paper explores multi-layer...
Pin Lu, Kai Shen
VTC
2007
IEEE
130views Communications» more  VTC 2007»
14 years 4 months ago
Phase Noise Suppression in OFDM with Spatial Multiplexing
— A very promising way to achieve high spectral efficiency in wireless communication is the use of multiple transmit and receive antennas. However, in combination with multicarr...
Steffen Bittner, Wolfgang Rave, Gerhard Fettweis
AIRWEB
2007
Springer
14 years 4 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...