Sciweavers

201 search results - page 37 / 41
» Periodicity in Streams
Sort
View
LISA
2000
13 years 11 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
RTSS
2007
IEEE
14 years 4 months ago
ANDES: An ANalysis-Based DEsign Tool for Wireless Sensor Networks
— We have developed an analysis-based design tool, ANDES, for modeling a wireless sensor network system and analyzing its performance before deployment. ANDES enables designers t...
Vibha Prasad, Ting Yan, Praveen Jayachandran, Zeng...
SIGUCCS
2000
ACM
14 years 2 months ago
The Master Internship Program at Wabash College
Wabash College has initiated an innovative strategy to solve technology staffing problems experienced by many small undergraduate liberal arts colleges. This strategy targets stud...
Guy Davis, John C. Hanes
SADM
2010
128views more  SADM 2010»
13 years 8 months ago
Online training on a budget of support vector machines using twin prototypes
: This paper proposes twin prototype support vector machine (TVM), a constant space and sublinear time support vector machine (SVM) algorithm for online learning. TVM achieves its ...
Zhuang Wang, Slobodan Vucetic
SIGMETRICS
1998
ACM
14 years 1 months ago
Self-Similarity in File Systems
We demonstrate that high-level le system events exhibit selfsimilar behaviour, but only for short-term time scales of approximately under a day. We do so through the analysis of f...
Steven D. Gribble, Gurmeet Singh Manku, Drew S. Ro...