Sciweavers

947 search results - page 183 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
78
Voted
LISA
2007
14 years 12 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...
ESWA
2010
154views more  ESWA 2010»
14 years 8 months ago
Robust speech interaction in motorcycle environment
Aiming at robust spoken dialogue interaction in motorcycle environment, we investigate various configurations for a speech front-end, which consists of speech pre-processing, spee...
Iosif Mporas, Otilia Kocsis, Todor Ganchev, Nikos ...
WECWIS
2002
IEEE
131views ECommerce» more  WECWIS 2002»
15 years 2 months ago
A Proxy-Based Approach for Dynamic Content Acceleration on the WWW
Various dynamic content caching approaches have been proposed to address the performance and scalability problems faced by many Web sites that utilize dynamic content generation a...
Anindya Datta, Kaushik Dutta, Helen M. Thomas, Deb...
172
Voted
ICDE
2008
IEEE
130views Database» more  ICDE 2008»
15 years 11 months ago
A Sampling-Based Approach to Information Recovery
There has been a recent resurgence of interest in research on noisy and incomplete data. Many applications require information to be recovered from such data. For example, in sens...
Junyi Xie, Jun Yang 0001, Yuguo Chen, Haixun Wang,...