Sciweavers

254 search results - page 19 / 51
» Using model trees to characterize computer resource usage
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
13 years 7 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
CORR
2011
Springer
212views Education» more  CORR 2011»
13 years 7 days ago
Decision Support Tools for Cloud Migration in the Enterprise
— This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of...
Ali Khajeh-Hosseini, Ian Sommerville, Jurgen Bogae...
COOPIS
2002
IEEE
14 years 1 months ago
Composing and Deploying Grid Middleware Web Services Using Model Driven Architecture
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of complex grid applications, such as large-scale distributed co...
Aniruddha S. Gokhale, Balachandran Natarajan
ICNP
1998
IEEE
14 years 29 days ago
Receiver-based Multicast Scoping: A New Cost-Conscious Join/Leave Paradigm
In Internet multicast, the set of receivers can be dynamic with receivers joining and leaving a group asynchronously and without the knowledge of the sources. The Internet today u...
George F. Riley, Mostafa H. Ammar, Lenitra M. Clay
TON
2002
75views more  TON 2002»
13 years 8 months ago
Optimal retrial and timeout strategies for accessing network resources
The notion of timeout (namely, the maximal time to wait before retrying an action) turns up in many networking contexts, such as packet transmission, connection establishment, etc....
Lavy Libman, Ariel Orda