Sciweavers

381 search results - page 32 / 77
» host 2008
Sort
View
SIGKDD
2000
106views more  SIGKDD 2000»
13 years 7 months ago
Data Mining Models as Services on the Internet
The goal of this article is to raise a debate on the usefulness of providing data mining models as services on the internet. These services can be provided by anyone with adequate...
Sunita Sarawagi, Sree Hari Nagaralu
TISSEC
2002
82views more  TISSEC 2002»
13 years 7 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
SIGOPS
2010
72views more  SIGOPS 2010»
13 years 6 months ago
Semantic-less coordination of power management and application performance
A computer system often has multiple power management modules controlling different power knobs. Uncoordinated operation of these knobs not only leads to suboptimal operation but ...
Aman Kansal, Jie Liu, Abhishek Singh, Ripal Nathuj...
USENIX
2008
13 years 10 months ago
Large-scale Virtualization in the Emulab Network Testbed
Network emulation is valuable largely because of its ability to study applications running on real hosts and "somewhat real" networks. However, conservatively allocating...
Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon...
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...