Sciweavers

187 search results - page 24 / 38
» On the characterizations of (S, N)-implications
Sort
View
POPL
2007
ACM
14 years 10 months ago
Locality approximation using time
Reuse distance (i.e. LRU stack distance) precisely characterizes program locality and has been a basic tool for memory system research since the 1970s. However, the high cost of m...
Xipeng Shen, Jonathan Shaw, Brian Meeker, Chen Din...
DSN
2008
IEEE
14 years 4 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
INFOCOM
2008
IEEE
14 years 4 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
MUE
2008
IEEE
84views Multimedia» more  MUE 2008»
14 years 4 months ago
TCP-Based Dynamic Media Stream Adaptation in Ubiquitous Environment
More and more media material is consumed in ubiquitous environment where the service can be experienced over different devices, network conditions, network bearers, etc. Unlike in...
Gergely Hományi, Gábor Paller
ICC
2007
IEEE
14 years 4 months ago
A Measurement Based Dynamic Policy for Switched Processing Systems
Abstract- Switched Processing Systems (SPS) represent a canonical model for many areas of applications of communication, computer and manufacturing systems. They are characterized ...
Ying-Chao Hung, George Michailidis