Sciweavers

2192 search results - page 385 / 439
» Plumbing and Other Utilities
Sort
View
SIGCOMM
2004
ACM
14 years 2 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
SIGCOMM
2004
ACM
14 years 2 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
A game theoretic approach to provide incentive and service differentiation in P2P networks
Traditional Peer-to-Peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can easily access information without contributing any ...
Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, D...
AMEC
2004
Springer
14 years 2 months ago
Designing Auctions for Deliberative Agents
Abstract. In many settings, bidding agents for auctions do not know their preferences a priori. Instead, they must actively determine them through deliberation (e.g., information p...
Kate Larson, Tuomas Sandholm
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 2 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala