Sciweavers

1511 search results - page 235 / 303
» Event Processing - past, present and future
Sort
View
JCSS
2006
56views more  JCSS 2006»
13 years 9 months ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
JASIS
2000
120views more  JASIS 2000»
13 years 8 months ago
Probabilistic datalog: Implementing logical information retrieval for advanced applications
In the logical approach to information retrieval (IR), retrieval is considered as uncertain inference. Whereas classical IR models are based on propositional logic, we combine Dat...
Norbert Fuhr
IJHPCA
2002
101views more  IJHPCA 2002»
13 years 8 months ago
SCALA: A Performance System For Scalable Computing
Lack of effective performance-evaluation environments is a major barrier to the broader use of high performance computing. Conventional performance environments are based on profi...
Xian-He Sun, Thomas Fahringer, Mario Pantano
CN
1999
115views more  CN 1999»
13 years 8 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
INFOCOM
2010
IEEE
13 years 7 months ago
BGP Churn Evolution: a Perspective from the Core
—The scalability limitations of BGP have been a major concern in the networking community lately. An important issue in this respect is the rate of routing updates (churn) that B...
Ahmed Elmokashfi, Amund Kvalbein, Constantine Dovr...