• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 83
Next 10 →

Magnet: Robust and Efficient Collection through Control and Data Plane Integration

by unknown authors
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract - Add to MetaCart
Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause

Towards the SocioScope: an Information System for the Study of Social Dynamics through Digital Traces

by Andrea Vaccari , Francesco Calabrese , Bing Liu , Carlo Ratti - Proceedings of the 17 SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS’09 , 2009
"... ABSTRACT Over the past decade there has been an explosion in the deployment of pervasive systems like cell phone networks and content aggregators on the Internet that produce massive amounts of data as by-products of their interaction with users. This data is related to the actions and opinions of ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
of people and thereby to the overall dynamics of cities, how they function and evolve over time. Here we propose the implementation of a new information system, the SocioScope, that streamlines the operations of data gathering and data storage and that supports the diverse needs of the research community

DOI: 10.1140/epjst/e2012-01529-y THE EUROPEAN PHYSICAL JOURNAL SPECIAL TOPICS Review Active Brownian Particles From Individual to Collective Stochastic Dynamics

by P. Romanczuk, W. Ebeling, B. Lindner , 2012
"... Abstract. We review theoretical models of individual motility as well as collective dynamics and pattern formation of active particles. We focus on simple models of active dynamics with a particular emphasis on nonlinear and stochastic dynamics of such self-propelled entities in the framework of sta ..."
Abstract - Add to MetaCart
Abstract. We review theoretical models of individual motility as well as collective dynamics and pattern formation of active particles. We focus on simple models of active dynamics with a particular emphasis on nonlinear and stochastic dynamics of such self-propelled entities in the framework

List of Tables...........................

by Catherine Rose, Mills Olschanowsky, Catherine Rose, Mills Olschanowsky , 2011
"... by ..."
Abstract - Add to MetaCart
Abstract not found

†Databases and Distributed Systems

by Technische Universität Darmstadt Darmstadt
"... Abstract—We present an approach to the generation of realistic synthetic workloads for use in benchmarking of (massively) multiplayer online gaming infrastructures. Existing techniques are either too simple to be realistic or are too specific to a particular network structure to be used for comparin ..."
Abstract - Add to MetaCart
are derived from a real gaming session with 16 players. We implemented the evaluation platform including the prototype game Planet PI4. A novel metric is used to measure the similarity between real and synthetic traces with respect to neighborhood characteristics. In our experiments, we compare real trace

Thesis Advisor Accepted by.......Gakenhimer..

by Gregory A. Rossel, Fiichael J. Shiffer, Ralph Gakenheimer, Gregory A. Rossel
"... ussRaNIte ..."
Abstract - Add to MetaCart
Abstract not found

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream

Modern Encyclopedia of Mathematical Physics

by Herbert Spohn, Springer Selecta , 706
"... Kinetic equations are a widely used and highly successful method to understand dynamical aspects of quantum many particle systems. As a standard reference I mention the book by Ziman [1] which in large parts is based on the kinetic method. My article deals with the issue to derive such an equation i ..."
Abstract - Add to MetaCart
Kinetic equations are a widely used and highly successful method to understand dynamical aspects of quantum many particle systems. As a standard reference I mention the book by Ziman [1] which in large parts is based on the kinetic method. My article deals with the issue to derive such an equation

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 83
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University