This paper presents traffic measurement of a Massively Multiplayer On-line Role Playing Game (MMORPG). This analysis characterizes the MMORPG traffic and shows its implications fo...
Jaecheol Kim, Jaeyoung Choi, Dukhyun Chang, Taekyo...
: Optimizers in modern DBMSs utilize a cost model to choose an efficient query execution plan (QEP) among all possible ones for a given query. The accuracy of the cost estimates de...
Stephan Ewen, Michael Ortega-Binderberger, Volker ...
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Mutation-based Evolutionary Algorithms, also known as Evolutionary Programming (EP) are commonly applied to Artificial Neural Networks (ANN) parameters optimization. This paper pre...
Kristina Davoian, Alexander Reichel, Wolfram-Manfr...