Sciweavers

154 search results - page 16 / 31
» The Complexity of Rationalizing Network Formation
Sort
View
IMC
2010
ACM
13 years 5 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
ISNN
2009
Springer
14 years 2 months ago
Research on Segment Acoustic Model Based Mandarin LVCSR
SM has shown a better performance than HMM in connected word recognition system; however, no reports we have read show that SM has been applied in LVCSR as decoding acoustic model ...
Wenju Liu, Yun Tang, Shouye Peng
IPTPS
2004
Springer
14 years 1 months ago
Uncoordinated Load Balancing and Congestion Games in P2P Systems
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
Subhash Suri, Csaba D. Tóth, Yunhong Zhou
SRDS
2007
IEEE
14 years 1 months ago
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, ha...
Laurent Burgy, Laurent Réveillère, J...
HT
2009
ACM
14 years 2 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer