default search action
32nd MASCOTS 2024: Krakow, Poland
- 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2024, Krakow, Poland, October 21-23, 2024. IEEE 2024, ISBN 979-8-3315-3130-0
- Jardi Martinez Jordan, Michael Stiber:
Graph-based Modeling and Simulation of Emergency Services Communication Systems. 1-4 - Hyoju Seo, Yongtae Kim:
Enabling Quantum Computer Simulation under Minimal Precision Floating-Point using Irrational Value Decomposition. 1-8 - David Hasselquist, János Dani, Niklas Carlsson:
Homomorphic Encryption Enabled Delta Encoding. 1-8 - Mohammed Nasereddin, Mert Nakip, Erol Gelenbe:
Deep Learning Intrusion Detection and Mitigation of DoS Attacks. 1-4 - Pawel Jarosz, Adam Marszalek:
Multi-Objective Optimization in Asynchronous Environments: An Evolutionary Game Theory Approach. 1-4 - Ilias Iliadis, Mark A. Lantz:
Reliability Evaluation of Automated Tape Library Systems. 1-8 - Martin Farkas, Balázs Ádám Toldi, Bertalan Zoltán Péter, Imre Kocsis:
A Prolog-based Approach to Self-Evaluated, Declarative and Zero-Knowledge Verifiable Policies. 1-6 - Jacob Bergquist, Erol Gelenbe, Karl Sigman:
On an Adaptive-Quasi-Deterministic Transmission Policy Queueing Model. 1-7 - Mohamed Bellouch, Lynda Zitoune, Iyad Lahsen Cherif, Véronique Vèque:
Load Balancing in Large WiFi Networks Using DQL-MultiMDP with Constrained Clustering. 1-8 - Seba Khaleel, Sreeharsha Udayashankar, Samer Al-Kiswany:
Slicify: Fault Injection Testing for Network Partitions. 1-8 - Godlove Suila Kuaban, Tadeusz Czachórski, Erol Gelenbe, Piotr Pecka, Valery Nkemeni, Piotr Czekalski:
Impact of energy leakage on the energy performance of green IoT nodes. 1-8 - Yaqi Zhou, Matthew Sheldon, Giuliano Casale:
Approximating Closed Queueing Networks in Semi-Markov Random Environments. 1-8 - Augusto C. S. A. Domingues, Fabrício A. Silva, Leticia Pinto, Rosangela Helena Loschi, Antonio A. F. Loureiro:
Leveraging Mobility Simulations with Realistic Origin-Destination Trajectory Filling. 1-8 - Daria Smuseva, Carla Piazza, Ivan Malakhov, Andrea Marin, Sabina Rossi:
Cosmos discovery: Quantitative assessment of Cosmos blockchain. 1-8 - Osama Khan, Gwanjong Park, Junyeol Yu, Euiseong Seo:
Cloud Reamer: Enabling Inference Services in Training Clusters. 1-8 - Ilias Kalouptsoglou, Miltiadis G. Siavvas, Apostolos Ampatzoglou, Dionysios D. Kehagias, Alexander Chatzigeorgiou:
Vulnerability prediction using pre-trained models: An empirical evaluation. 1-6 - Dávid Maliga, Roland Nagy, Levente Buttyán:
A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform. 1-6 - Nalith Udugampola, Xiaoyu Ai, Binghao Li, Aruna Seneviratne:
Scalability Analysis of Linear LoRa Mesh Networks. 1-8 - Mert Nakip, Erol Gelenbe:
An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs. 1-4 - Kemal Altwlkany, Hadzem Hadzic, Amar Kuric, Emanuel Lacic:
Knowledge Distillation for Real-Time Classification of Early Media in Voice Communications. 1-4 - Katarzyna Filus, Joanna Domanska, Jerzy Klamka:
Evaluating Convolutional Neural Networks via measuring similarity of their first-layer filters and Gabor filters. 1-8 - Miltiadis G. Siavvas, Ilias Kalouptsoglou, Erol Gelenbe, Dionysios D. Kehagias, Dimitrios Tzovaras:
Transforming the field of Vulnerability Prediction: Are Large Language Models the key? 1-6 - Vishwas Vasudeva Kakrannaya, Siddhartha Balakrishna Rai, Anand Sivasubramaniam, Timothy Zhu:
Fast and Accurate DNN Performance Estimation across Diverse Hardware Platforms. 1-8 - Hamin Hwangbo, Joseph Ro, Sungjin Byeon, Safdar Jamil, Jun Young Han, Jooyoung Hwang, Youngjae Kim:
Towards A Unified Garbage Collection Strategy in ZNS Key-Value Store File Systems Using Same-Victim GC. 1-8 - Roberto Sala, Bruno Guindani, Danilo Ardagna, Alessandra Guglielmi:
d-MALIBOO: a Bayesian Optimization framework for dealing with Discrete Variables. 1-8 - Minh-Khoi Nguyen-Nhat, Hoang Duy Nguyen Do, Huyen Thao Le, Thanh Tuan Dao:
LLMPerf: GPU Performance Modeling meets Large Language Models. 1-8 - Adityo Anggraito, Diletta Olliaro, Andrea Marin, Marco Ajmone Marsan:
The Non-Saturated Multiserver Job Queuing Model with Two Job Classes: a Matrix Geometric Analysis. 1-8 - Julianna Bor, Peter G. Harrison:
Response time in a pair of processor sharing queues with Join-the-Shortest-Queue scheduling. 1-8 - Tayebeh Bahreini, Asser N. Tantawi, Olivier Tardieu:
Caspian: A Carbon-aware Workload Scheduler in Multi-Cluster Kubernetes Environments. 1-8 - Ramon Barakat, Silvan Josten, Martin A. Schneider:
Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing. 1-6 - Camilla Cespi Polisiani, Marco Zuppelli, Maria Carla Calzarossa, Luca Caviglione, Massimo Guarascio:
Mitigation of Covert Communications in MQTT Topics Through Small Language Models. 1-6 - Sunyanan Choochotkaew, Tatsuhiro Chiba, Marcelo Amaral, Rina Nakazawa, Scott Trent, Eun Kyung Lee, Umamaheswari Devi, Tamar Eilam, Huamin Chen:
Best-Effort Power Model Serving for Energy Quantification of Cloud Instances. 1-4 - Shirish Bahirat, Madhurima Ray, Hamed Seyedroudbari:
DILATON: Multi-dimensional Quantum Deficit Algorithm for Multi-tenant SSD Resource Allocation. 1-4 - Yue Zhu, Chen Wang, Max Calman, Rina Nakazawa, Eun Kyung Lee:
Optimizing GPU Multiplexing for Efficient and Cost-Effective Access to Diverse Large Language Models in GPU Clusters. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.