Sciweavers

273 search results - page 50 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
87
Voted
HPDC
2003
IEEE
15 years 2 months ago
Optimizing GridFTP through Dynamic Right-Sizing
In this paper, we describe the integration of dynamic right-sizing — an automatic and scalable buffer management technique for enhancing TCP performance — into GridFTP, a sub...
Sunil Thulasidasan, Wu-chun Feng, Mark K. Gardner
MOBISYS
2003
ACM
15 years 9 months ago
Collaboration and Multimedia Authoring on Mobile Devices
This paper introduces adaptation-aware editing and progressive update propagation, two novel mechanisms that enable authoring multimedia content and collaborative work on mobile d...
Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy...
61
Voted
IMC
2006
ACM
15 years 3 months ago
Generating a privacy footprint on the internet
As a follow up to characterizing traffic deemed as unwanted by Web clients such as advertisements, we examine how information related to individual users is aggregated as a result...
Balachander Krishnamurthy, Craig E. Wills
KDD
2010
ACM
250views Data Mining» more  KDD 2010»
15 years 1 months ago
Modeling relational events via latent classes
Many social networks can be characterized by a sequence of dyadic interactions between individuals. Techniques for analyzing such events are of increasing interest. In this paper,...
Christopher DuBois, Padhraic Smyth
85
Voted
SBACPAD
2008
IEEE
170views Hardware» more  SBACPAD 2008»
15 years 3 months ago
Using Analytical Models to Efficiently Explore Hardware Transactional Memory and Multi-Core Co-Design
Transactional memory is emerging as a parallel programming paradigm for multi-core processors. Despite the recent interest in transactional memory, there has been no study to char...
James Poe, Chang-Burm Cho, Tao Li