Login / Signup
Effective Straggler Mitigation: Which Clones Should Attack and When?
Mehmet Fatih Aktas
Pei Peng
Emina Soljanin
Published in:
CoRR (2017)
Keyphrases
</>
high quality
neural network
real time
decision making
clustering algorithm
cost effective
databases
feature selection
three dimensional
cooperative
attack detection
malicious users