Sciweavers

3829 search results - page 161 / 766
» Improving Our Reviewing Processes
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
15 years 2 months ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley
ESORICS
2004
Springer
15 years 9 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
SOPR
1998
117views more  SOPR 1998»
15 years 3 months ago
Towards mature IT services
Many organizations provide information technology services, either to external or internal customers. They maintain software, operate information systems, manage and maintain work...
Frank Niessink, Hans van Vliet
EUROPAR
2008
Springer
15 years 6 months ago
Performance Implications of Cache Affinity on Multicore Processors
Cache affinity between a process and a processor is observed when the processor cache has accumulated some amount of the process state, i.e., data or instructions. Cache affinity i...
Vahid Kazempour, Alexandra Fedorova, Pouya Alagheb...