Sciweavers

4345 search results - page 595 / 869
» Temporal Constraint Networks
Sort
View
PERVASIVE
2009
Springer
15 years 9 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
127
Voted
DSN
2009
IEEE
15 years 9 months ago
System log pre-processing to improve failure prediction
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering ...
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Gei...
94
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Perceptual quality based packet dropping for generalized video GOP structures
Our work builds a general visibility model of video packets which is applicable to various types of GOP (Group of Pictures). The data used for analysis and building the model come...
Ting-Lan Lin, Yuan Zhi, Sandeep Kanumuri, Pamela C...
110
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Cutting the electric bill for internet-scale systems
Energy expenses are becoming an increasingly important fraction of data center operating costs. At the same time, the energy expense per unit of computation can vary significantl...
Asfandyar Qureshi, Rick Weber, Hari Balakrishnan, ...
98
Voted
DSN
2008
IEEE
15 years 9 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...