Sciweavers

70 search results - page 13 / 14
» Understanding the Limitations of Causally and Totally Ordere...
Sort
View
ANCS
2009
ACM
13 years 3 months ago
LaFA: lookahead finite automata for scalable regular expression detection
Although Regular Expressions (RegExes) have been widely used in network security applications, their inherent complexity often limits the total number of RegExes that can be detec...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
INFOCOM
2009
IEEE
14 years 19 days ago
Considerations for Sizing Buffers in Optical Packet Switched Networks
— Optical packet switches of the foreseeable future are expected to have severely limited buffering capability, since storage of optical signals remains a difficult and expensiv...
Arun Vishwanath, Vijay Sivaraman, George N. Rouska...
INFOCOM
2008
IEEE
14 years 12 days ago
Inside the New Coolstreaming: Principles, Measurements and Performance Implications
—The Peer-to-Peer (P2P) based video streaming has emerged as a promising solution for Internet video distribution. Leveraging the resource available at end users, this approach p...
Bo Li, Susu Xie, Yang Qu, Gabriel Yik Keung, Chuan...
SAC
2005
ACM
13 years 11 months ago
Performance analysis framework for large software-intensive systems with a message passing paradigm
The launch of new features for mobile phones is increasing and the product life cycle symmetrically decreasing in duration as higher levels of sophistication are reached. Therefor...
Christian Del Rosso
HICSS
1994
IEEE
141views Biometrics» more  HICSS 1994»
13 years 10 months ago
Empirical CATeam Research in Meetings
Meeting research and especially research on Computer Supported Meetings of natural teams is not available in abundance. What is reported of meetings often uses a rather limited th...
Helmut Krcmar, Henrik Lewe, Gerhard Schwabe