Sciweavers

980 search results - page 149 / 196
» On Negative Bases
Sort
View
JSAC
2006
137views more  JSAC 2006»
13 years 7 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
JSS
2006
80views more  JSS 2006»
13 years 7 months ago
Polyhedral space generation and memory estimation from interface and memory models of real-time video systems
We present a tool and a methodology for estimating the memory storage requirement for synchronous real-time video processing systems. Typically, a designer will use the feedback i...
Benny Thörnberg, Qubo Hu, Martin Palkovic, Ma...
FUIN
2007
121views more  FUIN 2007»
13 years 7 months ago
A Possibility-Theoretic View of Formal Concept Analysis
Abstract. The paper starts from the standard relational view linking objects and properties in formal concept analysis, here augmented with four modal-style operators (known as suf...
Didier Dubois, Florence Dupin de Saint-Cyr, Henri ...
TON
2008
79views more  TON 2008»
13 years 7 months ago
A stochastic foundation of available bandwidth estimation: multi-hop analysis
This paper analyzes the asymptotic behavior of packet-train probing over a multi-hop network path carrying arbitrarily routed bursty cross-traffic flows. We examine the statistical...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...
TON
2008
76views more  TON 2008»
13 years 7 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun