Sciweavers

1551 search results - page 127 / 311
» Privacy-Preserving Network Aggregation
Sort
View
CSCW
2010
ACM
14 years 7 months ago
Same places, same things, same people?: mining user similarity on social media
In this work we examine nine different sources for user similarity as reflected by activity in social media applications. We suggest a classification of these sources into three c...
Ido Guy, Michal Jacovi, Adam Perer, Inbal Ronen, E...
GRID
2004
Springer
14 years 3 months ago
DiPerF: An Automated DIstributed PERformance Testing Framework
We present DiPerF, a distributed performance-testing framework, aimed at simplifying and automating service performance evaluation. DiPerF coordinates a pool of machines that test...
Catalin Dumitrescu, Ioan Raicu, Matei Ripeanu, Ian...
IMC
2003
ACM
14 years 3 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
PADS
1998
ACM
14 years 2 months ago
Optimizing Communication in Time-Warp Simulators
In message passing environments, the message send time is dominated by overheads that are relatively independent of the message size. Therefore, fine-grained applications (such a...
Malolan Chetlur, Nael B. Abu-Ghazaleh, Radharamana...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 8 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero