Sciweavers

634 search results - page 12 / 127
» Some observations on bitTorrent performance
Sort
View
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 2 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
ACMSE
2008
ACM
13 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
IMC
2003
ACM
14 years 2 months ago
Simple network performance tomography
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
Nick G. Duffield
COMPSAC
2000
IEEE
14 years 1 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau
JMLR
2010
118views more  JMLR 2010»
13 years 3 months ago
On Over-fitting in Model Selection and Subsequent Selection Bias in Performance Evaluation
Model selection strategies for machine learning algorithms typically involve the numerical optimisation of an appropriate model selection criterion, often based on an estimator of...
Gavin C. Cawley, Nicola L. C. Talbot