Sciweavers

544 search results - page 87 / 109
» Can Realistic BitTorrent Experiments Be Performed on Cluster...
Sort
View
TON
2012
11 years 10 months ago
Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow
—The inherent measurement support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problem...
Myungjin Lee, Nick G. Duffield, Ramana Rao Kompell...
ASPLOS
2004
ACM
14 years 1 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
IMC
2007
ACM
13 years 9 months ago
Network loss inference with second order statistics of end-to-end flows
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to existing works that use only the average end-to-end loss rates or strict temporal c...
Hung Xuan Nguyen, Patrick Thiran
AAAI
2010
13 years 9 months ago
Informed Lifting for Message-Passing
Lifted inference, handling whole sets of indistinguishable objects together, is critical to the effective application of probabilistic relational models to realistic real world ta...
Kristian Kersting, Youssef El Massaoudi, Fabian Ha...
GECCO
2008
Springer
138views Optimization» more  GECCO 2008»
13 years 9 months ago
Modular neuroevolution for multilegged locomotion
Legged robots are useful in tasks such as search and rescue because they can effectively navigate on rugged terrain. However, it is difficult to design controllers for them that ...
Vinod K. Valsalam, Risto Miikkulainen