Sciweavers

18204 search results - page 3588 / 3641
» Distributed Video Presentations
Sort
View
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
13 years 10 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....
JPDC
2006
253views more  JPDC 2006»
13 years 10 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
JSAC
2006
93views more  JSAC 2006»
13 years 10 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
ML
2008
ACM
101views Machine Learning» more  ML 2008»
13 years 10 months ago
On reoptimizing multi-class classifiers
Significant changes in the instance distribution or associated cost function of a learning problem require one to reoptimize a previously-learned classifier to work under new cond...
Chris Bourke, Kun Deng, Stephen D. Scott, Robert E...
JSS
2006
111views more  JSS 2006»
13 years 10 months ago
Declarative programming of integrated peer-to-peer and Web based systems: the case of Prolog
Web and peer-to-peer systems have emerged as popular areas in distributed computing, and their integrated usage permits the benefits of both to be exploited. While much work in th...
Seng Wai Loke
« Prev « First page 3588 / 3641 Last » Next »