Sciweavers

78 search results - page 15 / 16
» Efficient dynamic traitor tracing
Sort
View
JCM
2007
87views more  JCM 2007»
13 years 9 months ago
Optimization of Radio Measurements Exploitation in Wireless Mobile Networks
— Radio measurements play a crucial role in mobile wireless networks as they are input of Radio Resource Management (RRM) mechanisms, needed to assess mobile network reliability ...
Afef Ben Hadj Alaya-Feki, Alain Le Cornec, Eric Mo...
JCST
2008
121views more  JCST 2008»
13 years 9 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
TC
2008
13 years 9 months ago
Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems
Abstract--Today's storage systems place an imperative demand on energy efficiency. A storage system often places single-rotationrate disks into standby mode by stopping them f...
Jun Wang, Xiaoyu Yao, Huijun Zhu
NSDI
2010
13 years 11 months ago
ElasticTree: Saving Energy in Data Center Networks
Networks are a shared resource connecting critical IT infrastructure, and the general practice is to always leave them on. Yet, meaningful energy savings can result from improving...
Brandon Heller, Srinivasan Seetharaman, Priya Maha...
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 11 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel