Search

Your search keyword '"Menasche P"' showing total 356 results

Search Constraints

Start Over You searched for: Author "Menasche P" Remove constraint Author: "Menasche P"
356 results on '"Menasche P"'

Search Results

1. Minimally Intrusive Access Management to Content Delivery Networks based on Performance Models and Access Patterns

2. Harnessing TI Feeds for Exploitation Detection

3. Online Learning of Weakly Coupled MDP Policies for Load Balancing and Auto Scaling

4. SARS-CoV-2-related bat viruses evade human intrinsic immunity but lack efficient transmission capacity

5. Grain boundary migration in polycrystalline $\alpha$-Fe

6. Performance Model for Similarity Caching

7. Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

8. Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?

9. On Collaboration in Distributed Parameter Estimation with Resource Constraints

10. The KDM6A-KMT2D-p300 axis regulates susceptibility to diverse coronaviruses by mediating viral receptor expression.

11. Computing the Hit Rate of Similarity Caching

12. Comida e consumo na pandemia e após: um olhar a partir dos mercados de Madrid

13. To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints?

14. Joint Traffic Offloading and Aging Control in 5G IoT Networks

15. Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result

16. Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures

17. Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services

18. Network-aware Recommendations in the Wild: Methodology, Realistic Evaluations, Experiments

19. A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate

20. Network Anomaly Detection based on Tensor Decomposition

21. Pharmacological disruption of mSWI/SNF complex activity restricts SARS-CoV-2 infection

22. Differences in syncytia formation by SARS-CoV-2 variants modify host chromatin accessibility and cellular senescence via TP53

23. Risk of COVID-19 after natural infection or vaccinationResearch in context

24. How often should I access my online social networks?

25. Towards QoS-Aware Recommendations

26. When Should Recommenders Account for Low QoS?

27. Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments

29. The KDM6A-KMT2D-p300 axis regulates susceptibility to diverse coronaviruses by mediating viral receptor expression.

30. Fairness in Online Social Network Timelines: Measurements, Models and Mechanism Design

31. Biases in the Facebook News Feed: a Case Study on the Italian Elections

32. Omicron-specific mRNA vaccination alone and as a heterologous booster against SARS-CoV-2

33. Design and Analysis of Distributed Tree Growing Algorithms

35. An SMDP Approach to Optimal PHY Configuration in Wireless Networks

36. Search and Placement in Tiered Cache Networks

37. Optimal Dynamic Routing for the Wireless Relay Channel

38. A Utility Optimization Approach to Network Cache Design

39. Modeling and Analysis of Converged Network-Cloud Services

41. Q-caching: an integrated reinforcement-learning approach for caching and routing in information-centric networks

42. Flexible Content Placement in Cache Networks using Reinforced Counters

44. On The Scalability of P2P Swarming Systems

45. Beyond Herd Immunity Against Strategic Attackers

46. Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services

47. Enabling Information Centric Networks through Opportunistic Search, Routing and Caching

48. Forever Young: Aging Control For Smartphones In Hybrid Networks

49. Estimating Self-Sustainability in Peer-to-Peer Swarming Systems

50. CCS-Based Dynamic Logics for Communicating Concurrent Programs

Catalog

Books, media, physical & digital resources