Sciweavers

8294 search results - page 1612 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
128
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
110
Voted
CCGRID
2007
IEEE
15 years 9 months ago
Exploiting Lustre File Joining for Effective Collective IO
Lustre is a parallel file system that presents high aggregated IO bandwidth by striping file extents across many storage devices. However, our experiments indicate excessively wid...
Weikuan Yu, Jeffrey S. Vetter, Shane Canon, Song J...
INFOCOM
2006
IEEE
15 years 8 months ago
MobiStream: Error-Resilient Video Streaming in Wireless WANs Using Virtual Channels
—We present MobiStream— a video streaming system that exploits the perceptual value in video content and the characteristics of the link layer and physical layer channels to en...
Rajiv Chakravorty, Suman Banerjee, Samrat Ganguly
107
Voted
ICDCS
2005
IEEE
15 years 8 months ago
Optimal Component Composition for Scalable Stream Processing
Stream processing has become increasingly important with emergence of stream applications such as audio/video surveillance, stock price tracing, and sensor data analysis. A challe...
Xiaohui Gu, Philip S. Yu, Klara Nahrstedt
109
Voted
MM
2003
ACM
118views Multimedia» more  MM 2003»
15 years 7 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
« Prev « First page 1612 / 1659 Last » Next »