Now showing items 1-6 of 6
Performance Modeling And Evaluation Of Network Processors
In recent years there has been an exponential growth in Internet traffic resulting in increased network bandwidth requirements which, in turn, has led to stringent processing requirements on network layer devices like ...
Reduction Of Query Optimizer Plan Diagrams
Modern database systems use a query optimizer to identify the most efficient strategy, called "plan", to execute declarative SQL queries. Optimization is a mandatory exercise since the difference between the cost of best ...
Applications Of Machine Learning To Anomaly Based Intrusion Detection
This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...
Information Theoretic Approach To Extractive Text Summarization
Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ...
On The Issues Of Supporting On-Demand Streaming Application Over Peer-to-Peer Networks
Bandwidth and resource constraints at the server side is a limitation for deployment of streaming media applications. Resource constraints at the server side often leads to saturation of resources during sudden increase ...
Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems
Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...