Sciweavers

7311 search results - page 1305 / 1463
» Time in State Machines
Sort
View
CONEXT
2010
ACM
15 years 2 months ago
SecondNet: a data center network virtualization architecture with bandwidth guarantees
In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers becaus...
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Y...
150
Voted
EMNLP
2010
15 years 2 months ago
Learning First-Order Horn Clauses from Web Text
Even the entire Web corpus does not explicitly answer all questions, yet inference can uncover many implicit answers. But where do inference rules come from? This paper investigat...
Stefan Schoenmackers, Jesse Davis, Oren Etzioni, D...
GLOBECOM
2010
IEEE
15 years 2 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
IGARSS
2010
15 years 2 months ago
High-rate local sea level monitoring with a GNSS-based tide gauge
We present first results from the analysis of high-rate observations with a GNSS-based tide gauge at the Onsala Space Observatory. The goal is to determine local sea level with hi...
Johan S. Löfgren, Rudiger Haas, Jan M. Johans...
IPPS
2010
IEEE
15 years 2 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...
« Prev « First page 1305 / 1463 Last » Next »