Sciweavers

1265 search results - page 20 / 253
» Better Burst Detection
Sort
View
ICSE
2007
IEEE-ACM
14 years 7 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...
ICC
2008
IEEE
138views Communications» more  ICC 2008»
14 years 2 months ago
Dealing with Sudden Bandwidth Changes in TCP
— In this paper, we propose a novel technique to deal with sudden bandwidth changes in TCP. In the current Internet, sudden bandwidth changes may occur due to vertical handovers ...
Euiyul Ko, Donghyeok An, Ikjun Yeom
IPCCC
2005
IEEE
14 years 1 months ago
A tree-based reliable multicast scheme exploiting the temporal locality of transmission errors
Tree-based reliable multicast protocols provide scalability by distributing error-recovery tasks among several repair nodes. These repair nodes keep in their buffers all packets t...
Jinsuk Baek, Jehan-François Pâris
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 11 months ago
Mining top-k frequent items in a data stream with flexible sliding windows
We study the problem of finding the k most frequent items in a stream of items for the recently proposed max-frequency measure. Based on the properties of an item, the maxfrequen...
Hoang Thanh Lam, Toon Calders
JPDC
2006
87views more  JPDC 2006»
13 years 7 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...