Sciweavers

8135 search results - page 1514 / 1627
» network 2008
Sort
View
150
Voted
FLAIRS
2008
15 years 5 months ago
Using Genetic Programming to Increase Rule Quality
Rule extraction is a technique aimed at transforming highly accurate opaque models like neural networks into comprehensible models without losing accuracy. G-REX is a rule extract...
Rikard König, Ulf Johansson, Lars Niklasson
122
Voted
HOTDEP
2008
107views Hardware» more  HOTDEP 2008»
15 years 5 months ago
Reverse-Engineering Drivers for Safety and Portability
Device drivers today lack two important properties: guaranteed safety and cross-platform portability. We present an approach to incrementally achieving these properties in drivers...
Vitaly Chipounov, George Candea
USENIX
2008
15 years 5 months ago
Evaluating Distributed Systems: Does Background Traffic Matter?
Evaluating novel networked protocols and services requires subjecting the target system to realistic Internet conditions. However, there is no common understanding of what is requ...
Kashi Venkatesh Vishwanath, Amin Vahdat
116
Voted
USENIX
2008
15 years 5 months ago
Experiences with Client-based Speculative Remote Display
We propose an approach to remote display systems in which the client predicts the screen update events that the server will send and applies them to the screen immediately, thus e...
John R. Lange, Peter A. Dinda, Samuel Rossoff
USS
2008
15 years 5 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
« Prev « First page 1514 / 1627 Last » Next »