Sciweavers

673 search results - page 6 / 135
» Request behavior variations
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 2 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
NIPS
2007
13 years 9 months ago
Fast Variational Inference for Large-scale Internet Diagnosis
Web servers on the Internet need to maintain high reliability, but the cause of intermittent failures of web transactions is non-obvious. We use approximate Bayesian inference to ...
John C. Platt, Emre Kiciman, David A. Maltz
SIGIR
2008
ACM
13 years 7 months ago
To personalize or not to personalize: modeling queries with variation in user intent
In most previous work on personalized search algorithms, the results for all queries are personalized in the same manner. However, as we show in this paper, there is a lot of vari...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
ASPDAC
2009
ACM
155views Hardware» more  ASPDAC 2009»
14 years 2 months ago
Variation-aware resource sharing and binding in behavioral synthesis
— As technology scales, the delay uncertainty caused by process variations has become increasingly pronounced in deep submicron designs. In the presence of process variations, wo...
Feng Wang 0004, Yuan Xie, Andres Takach
HIPC
2009
Springer
13 years 5 months ago
Detailed analysis of I/O traces for large scale applications
- In this paper, we present a tool to extract I/O traces from very large applications running at full scale during their production runs. We analyze these traces to gain informatio...
Nithin Nakka, Alok N. Choudhary, Wei-keng Liao, Le...