Sciweavers

6229 search results - page 1042 / 1246
» Models of Computation for Networks on Chip
Sort
View
IPTPS
2005
Springer
14 years 4 months ago
The Bittorrent P2P File-Sharing System: Measurements and Analysis
Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components f...
Johan A. Pouwelse, Pawel Garbacki, Dick H. J. Epem...
CCS
2003
ACM
14 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
AINA
2009
IEEE
14 years 3 months ago
Do Metrics Make Recommender Algorithms?
Recommender systems are used to suggest customized products to users. Most recommender algorithms create collaborative models by taking advantage of web user profiles. In the las...
Elica Campochiaro, Riccardo Casatta, Paolo Cremone...
AINA
2009
IEEE
14 years 3 months ago
DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator
The Business Process Execution Language for Web Services (BPEL4WS) is the de facto standard for the composition of web services into complex, valued-added workflows in both indus...
Tim Dörnemann, Markus Mathes, Roland Schwarzk...
ICNP
2000
IEEE
14 years 3 months ago
An Analysis of Packet Loss Correlation in FEC-Enhanced Multicast Trees
We study group loss probabilities of Forward Error Correction (FEC) codes in shared loss multicast communication. We present a new analysis model with explicit state equations usi...
Marc Mosko, J. J. Garcia-Luna-Aceves
« Prev « First page 1042 / 1246 Last » Next »