Sciweavers

984 search results - page 189 / 197
» Experimenting with Multi-Level Models in a Two-Level Modelin...
Sort
View
125
Voted
CN
2004
95views more  CN 2004»
15 years 3 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
175
Voted
TON
2010
167views more  TON 2010»
14 years 10 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
142
Voted
ECCV
2004
Springer
16 years 5 months ago
The Least-Squares Error for Structure from Infinitesimal Motion
We analyze the least?squares error for structure from motion with a single infinitesimal motion ("structure from optical flow"). We present asymptotic approximations to ...
John Oliensis
118
Voted
DAC
2002
ACM
16 years 4 months ago
Component-based design approach for multicore SoCs
This paper presents a high-level component-based methodology and design environment for application-specific multicore SoC architectures. Component-based design provides primitive...
Ahmed Amine Jerraya, Amer Baghdadi, Damien Lyonnar...
WWW
2005
ACM
16 years 4 months ago
Design for verification for asynchronously communicating Web services
We present a design for verification approach to developing reliable web services. We focus on composite web services which consist of asynchronously communicating peers. Our goal...
Aysu Betin-Can, Tevfik Bultan, Xiang Fu