Sciweavers

10615 search results - page 2113 / 2123
» Dynamic topic models
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
PDP
2010
IEEE
13 years 8 months ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao
RTAS
2010
IEEE
13 years 8 months ago
Feedback Thermal Control for Real-time Systems
—Thermal control is crucial to real-time systems as excessive processor temperature can cause system failure or unacceptable performance degradation due to hardware throttling. R...
Yong Fu, Nicholas Kottenstette, Yingming Chen, Che...
SIAMCO
2010
116views more  SIAMCO 2010»
13 years 8 months ago
Large-Population LQG Games Involving a Major Player: The Nash Certainty Equivalence Principle
We consider linear-quadratic-Gaussian (LQG) games with a major player and a large number of minor players. The major player has a significant influence on others. The minor playe...
Minyi Huang
STVR
2010
99views more  STVR 2010»
13 years 8 months ago
Fault localization based on information flow coverage
Failures triggered by hard to debug defects usually involve complex interactions between many program elements. We hypothesize that information flows present a good model for such ...
Wes Masri
« Prev « First page 2113 / 2123 Last » Next »