Sciweavers

2517 search results - page 50 / 504
» The Fairness Challenge in Computer Networks
Sort
View
SENSYS
2009
ACM
14 years 3 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
KDD
2004
ACM
170views Data Mining» more  KDD 2004»
14 years 2 months ago
Estimating the size of the telephone universe: a Bayesian Mark-recapture approach
Mark-recapture models have for many years been used to estimate the unknown sizes of animal and bird populations. In this article we adapt a finite mixture mark-recapture model i...
David Poole
FM
2006
Springer
172views Formal Methods» more  FM 2006»
14 years 11 days ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
RAID
2010
Springer
13 years 7 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter

Publication
348views
15 years 7 months ago
Source Behavior for ATM ABR Traffic Management: An Explanation
he Available Bit Rate (ABR) service has been developed to support data applications over Asynchronous Transfer Mode (ATM) networks. The network continuously monitors its traffic an...
Raj Jain, Shiv Kalyanaraman, Sonia Fahmy, Rohit Go...