Sciweavers

611 search results - page 119 / 123
» Knowledge Acquisition Evaluation Using Simulated Experts
Sort
View
SIGMETRICS
2004
ACM
125views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
A hybrid direct-indirect estimator of network internal delays
The network tomography problem requires a remote source to estimate network-internal statistics on individual links within the network. Several techniques have been proposed to pe...
Kostas G. Anagnostakis, Michael Greenwald
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
EWSN
2010
Springer
14 years 4 months ago
Selective Reprogramming of Mobile Sensor Networks through Social Community Detection
Abstract. We target application domains where the behavior of animals or humans is monitored using wireless sensor network (WSN) devices. The code on these devices is updated frequ...
Bence Pásztor, Luca Mottola, Cecilia Mascol...
SIGCOMM
2004
ACM
14 years 1 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
SIGCOMM
2004
ACM
14 years 1 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....