Sciweavers

619 search results - page 91 / 124
» Multivariate Information Bottleneck
Sort
View
CN
2007
141views more  CN 2007»
15 years 4 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
ECCC
2007
99views more  ECCC 2007»
15 years 4 months ago
An Exponential Time/Space Speedup For Resolution
Satisfiability algorithms have become one of the most practical and successful approaches for solving a variety of real-world problems, including hardware verification, experime...
Philipp Hertel, Toniann Pitassi
JNW
2006
120views more  JNW 2006»
15 years 4 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
ENGL
2007
71views more  ENGL 2007»
15 years 4 months ago
The Development of a Generic Technique for Flow Line Monitoring
Realize the operating conditions of a manufacturing plant are essential for providing corresponding actions responsively. This is because all processes are interrelated and a smal...
C. S. Tang, C. Y. Chan, Kai-Leung Yung
JSAC
2006
93views more  JSAC 2006»
15 years 4 months ago
Towards a Generalized Stochastic Model of End-to-End Packet-Pair Sampling
End-to-end packet-pair probing has been used as one of the primary mechanisms to measure bottleneck capacity, crosstraffic intensity, and available bandwidth of end-to-end Internet...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...