Sciweavers

673 search results - page 96 / 135
» Request behavior variations
Sort
View
ISPASS
2007
IEEE
14 years 1 months ago
Modeling and Characterizing Power Variability in Multicore Architectures
Parameter variation due to manufacturing error will be an unavoidable consequence of technology scaling in future generations. The impact of random variation in physical factors s...
Ke Meng, Frank Huebbers, Russ Joseph, Yehea I. Ism...
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
ATAL
2010
Springer
13 years 8 months ago
Frequency adjusted multi-agent Q-learning
Multi-agent learning is a crucial method to control or find solutions for systems, in which more than one entity needs to be adaptive. In today's interconnected world, such s...
Michael Kaisers, Karl Tuyls
SAS
2012
Springer
208views Formal Methods» more  SAS 2012»
11 years 10 months ago
Finding Non-terminating Executions in Distributed Asynchronous Programs
Programming distributed and reactive asynchronous systems is complex due to the lack of synchronization between concurrently executing tasks, and arbitrary delay of message-based c...
Michael Emmi, Akash Lal
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 1 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...