Sciweavers

1920 search results - page 380 / 384
» Example of communication between distributed network systems...
Sort
View
CCR
2010
152views more  CCR 2010»
13 years 4 months ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 4 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
CDC
2009
IEEE
151views Control Systems» more  CDC 2009»
14 years 4 days ago
A poset framework to model decentralized control problems
— In this paper we use partially ordered sets (posets) to study decentralized control problems arising in different settings. We show that time delayed systems with certain dela...
Parikshit Shah, Pablo A. Parrilo
INFOCOM
2007
IEEE
14 years 1 months ago
Achievable Capacity Under the Interference Temperature Model
— The Interference Temperature Model was proposed by the FCC in 2003 as a way to dynamically manage and allocate spectrum resources. It would allow unlicensed radios to sense the...
Thomas C. Clancy
HT
2004
ACM
14 years 25 days ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge