Sciweavers

13414 search results - page 2564 / 2683
» The distributed boosting algorithm
Sort
View
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 8 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...
108
Voted
ICC
2008
IEEE
136views Communications» more  ICC 2008»
15 years 8 months ago
A Game-Theoretic Framework for Interference Management through Cognitive Sensing
A game theoretic framework is developed in this paper to facilitate inter-cell interference management through cognitive sensing distributively performed by mobile stations (MSs)....
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
15 years 8 months ago
Unsupervised Face Annotation by Mining the Web
Searching for images of people is an essential task for image and video search engines. However, current search engines have limited capabilities for this task since they rely on ...
Duy-Dinh Le, Shin'ichi Satoh
145
Voted
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 8 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
132
Voted
IEEEPACT
2008
IEEE
15 years 8 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
« Prev « First page 2564 / 2683 Last » Next »