Sciweavers

412 search results - page 76 / 83
» Utility maximization in peer-to-peer systems
Sort
View
IWIA
2005
IEEE
14 years 4 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
RTSS
1999
IEEE
14 years 3 months ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...
RTSS
1998
IEEE
14 years 3 months ago
Practical Solutions for QoS-Based Resource Allocation
Abstract: The QoS-based Resource Allocation Model (QRAM) proposed in [20] presented an analytical approach for satisfying multiple quality-of-service dimensions in a resource-const...
Ragunathan Rajkumar, Chen Lee, John P. Lehoczky, D...
AAAI
2006
14 years 9 days ago
A Bayesian Network for Outbreak Detection and Prediction
Health care officials are increasingly concerned with knowing early whether an outbreak of a particular disease is unfolding. We often have daily counts of some variable that are ...
Xia Jiang, Garrick L. Wallstrom
GRID
2008
Springer
13 years 11 months ago
Can Economics-based Resource Allocation Prove Effective in a Computation Marketplace?
Several companies offer computation on demand for a fee. More companies are expected to enter this business over the next decade, leading to a marketplace for computation resource...
Kevin L. Mills, Christopher Dabrowski