Sciweavers

2035 search results - page 334 / 407
» Working memory
Sort
View
117
Voted
TMA
2010
Springer
183views Management» more  TMA 2010»
15 years 14 days ago
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for ...
Alessandro Finamore, Michela Meo, Dario Rossi, Sil...
131
Voted
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 10 days ago
Self-Adaptive Anytime Stream Clustering
Clustering streaming data requires algorithms which are capable of updating clustering results for the incoming data. As data is constantly arriving, time for processing is limited...
Philipp Kranen, Ira Assent, Corinna Baldauf, Thoma...
133
Voted
ICNS
2009
IEEE
15 years 10 days ago
HGRID: Fault Tolerant, Log2N Resource Management for Grids
Grid Resource Discovery Service is currently a very important focus of research. We propose a scheme that presents essential characteristics for efficient, self-configuring and fau...
Antonia Gallardo, Kana Sanjeevan, Luis Díaz...
129
Voted
IJHPCA
2010
111views more  IJHPCA 2010»
14 years 12 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...
128
Voted

Publication
145views
14 years 10 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...