Sciweavers

1078 search results - page 208 / 216
» Networks with Small Stretch Number
Sort
View
ICPP
2008
IEEE
14 years 2 months ago
Machine Learning Models to Predict Performance of Computer System Design Alternatives
Computer manufacturers spend a huge amount of time, resources, and money in designing new systems and newer configurations, and their ability to reduce costs, charge competitive p...
Berkin Özisikyilmaz, Gokhan Memik, Alok N. Ch...
INFOCOM
2008
IEEE
14 years 2 months ago
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming
—This paper presents a systematic in-depth study on the existence, importance, and application of stable nodes in peerto-peer live video streaming. Using traces from a real large...
Feng Wang, Jiangchuan Liu, Yongqiang Xiong
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
14 years 2 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
EUROSSC
2007
Springer
14 years 2 months ago
The Design of a Pressure Sensing Floor for Movement-Based Human Computer Interaction
This paper addresses the design of a large area, high resolution, networked pressure sensing floor with primary application in movement-based human-computer interaction (M-HCI). T...
Sankar Rangarajan, Assegid Kidané, Gang Qia...
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 2 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester