Sciweavers

20778 search results - page 4033 / 4156
» Algorithms for Data Migration
Sort
View
118
Voted
IMC
2009
ACM
15 years 10 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...
124
Voted
ISSTA
2009
ACM
15 years 10 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
125
Voted
MM
2009
ACM
137views Multimedia» more  MM 2009»
15 years 10 months ago
Lightweight web image reranking
Web image search is inspired by text search techniques; it mainly relies on indexing textual data that surround the image file. But retrieval results are often noisy and image pro...
Adrian Popescu, Pierre-Alain Moëllic, Ioannis...
164
Voted
MOBICOM
2009
ACM
15 years 10 months ago
Frequency-aware rate adaptation and MAC protocols
There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing towar...
Hariharan Rahul, Farinaz Edalat, Dina Katabi, Char...
129
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator
Many network applications have stringent end-to-end latency requirements, including VoIP and interactive video conferencing, automated trading, and high-performance computing—wh...
Ramana Rao Kompella, Kirill Levchenko, Alex C. Sno...
« Prev « First page 4033 / 4156 Last » Next »