Sciweavers

1962 search results - page 367 / 393
» Evaluating System Performance in Gigabit Networks
Sort
View
CLUSTER
2007
IEEE
13 years 11 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
MMS
2006
13 years 7 months ago
Adaptive receiver-driven streaming from multiple senders
This paper presents design and evaluation of an adaptive streaming mechanism from multiple senders to a single receiver in Peer-toPeer (P2P) networks, called P2P Adaptive Layered ...
Nazanin Magharei, Reza Rejaie
JCS
2002
100views more  JCS 2002»
13 years 7 months ago
STATL: An Attack Language for State-Based Intrusion Detection
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
Steve T. Eckmann, Giovanni Vigna, Richard A. Kemme...
SC
2004
ACM
14 years 23 days ago
RPC-V: Toward Fault-Tolerant RPC for Internet Connected Desktop Grids with Volatile Nodes
RPC is one of the programming models envisioned for the Grid. In Internet connected Large Scale Grids such as Desktop Grids, nodes and networks failures are not rare events. This ...
Samir Djilali, Thomas Hérault, Oleg Lodygen...
AIIA
1999
Springer
13 years 11 months ago
An Implementation for Abductive Logic Agents
This paper presents thedistributed implementationof ALIAS, an architecture composed of several cooperating intelligent agents. This system is particularly suited to solve problems ...
Anna Ciampolini, Evelina Lamma, Paola Mello, Cesar...