Sciweavers

2004 search results - page 375 / 401
» Support for activity-based computing in a personal computing...
Sort
View
ASPLOS
2008
ACM
13 years 11 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
MASCOTS
2007
13 years 10 months ago
Network Performance Analysis based on Histogram Workload Models
Network performance analysis relies mainly on two models: a workload model and a performance model. This paper proposes to use histograms for characterising the arrival workloads ...
Enrique Hernández-Orallo, Joan Vila-Carb&oa...
AAAI
2006
13 years 10 months ago
Spinning Multiple Social Networks for Semantic Web
Social networks are important for the Semantic Web. Several means can be used to obtain social networks: using social networking services, aggregating Friendof-a-Friend (FOAF) doc...
Yutaka Matsuo, Masahiro Hamasaki, Yoshiyuki Nakamu...
CN
2007
172views more  CN 2007»
13 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ISF
2010
164views more  ISF 2010»
13 years 6 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu