Sciweavers

4345 search results - page 595 / 869
» Temporal Constraint Networks
Sort
View
PERVASIVE
2009
Springer
14 years 3 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
DSN
2009
IEEE
14 years 3 months ago
System log pre-processing to improve failure prediction
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering ...
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Gei...
ICASSP
2009
IEEE
14 years 3 months ago
Perceptual quality based packet dropping for generalized video GOP structures
Our work builds a general visibility model of video packets which is applicable to various types of GOP (Group of Pictures). The data used for analysis and building the model come...
Ting-Lan Lin, Yuan Zhi, Sandeep Kanumuri, Pamela C...
SIGCOMM
2009
ACM
14 years 2 months ago
Cutting the electric bill for internet-scale systems
Energy expenses are becoming an increasingly important fraction of data center operating costs. At the same time, the energy expense per unit of computation can vary significantl...
Asfandyar Qureshi, Rick Weber, Hari Balakrishnan, ...
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...