Sciweavers

2714 search results - page 137 / 543
» Under the table interaction
Sort
View
DISCEX
2003
IEEE
14 years 3 months ago
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/...
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. ...
ICPP
2003
IEEE
14 years 3 months ago
Accurately Modeling Workload Interactions for Deploying Prefetching in Web Servers
Although Web prefetching is regarded as an effective method to improve client access performance, the associated overhead prevents it from being widely deployed. Specifically, a ...
Xin Chen, Xiaodong Zhang
BIBE
2007
IEEE
153views Bioinformatics» more  BIBE 2007»
13 years 12 months ago
Combined expression data with missing values and gene interaction network analysis: a Markovian integrated approach
—DNA microarray technologies provide means for monitoring in the order of tens of thousands of gene expression levels quantitatively and simultaneously. However data generated in...
Juliette Blanchet, Matthieu Vignes
IJCAI
1989
13 years 11 months ago
Constraint Satisfiability Algorithms for Interactive Student Scheduling
A constraint satisfiability problem consists of a set of variables, their associated domains (i.e., the set of values the variable can take) and a set of constraints on these vari...
Ronen Feldman, Martin Charles Golumbic
ADHOC
2010
97views more  ADHOC 2010»
13 years 10 months ago
Modeling and analysis of two-flow interactions in wireless networks
Abstract--Interference plays a complex and often defining role in the performance of wireless networks, especially in multi-hop scenarios. In the presence of interference, Carrier ...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh