In this work we examine nine different sources for user similarity as reflected by activity in social media applications. We suggest a classification of these sources into three c...
Ido Guy, Michal Jacovi, Adam Perer, Inbal Ronen, E...
We present DiPerF, a distributed performance-testing framework, aimed at simplifying and automating service performance evaluation. DiPerF coordinates a pool of machines that test...
Catalin Dumitrescu, Ioan Raicu, Matei Ripeanu, Ian...
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
In message passing environments, the message send time is dominated by overheads that are relatively independent of the message size. Therefore, fine-grained applications (such a...
Malolan Chetlur, Nael B. Abu-Ghazaleh, Radharamana...
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...