Sciweavers

691 search results - page 108 / 139
» Control Choices and Network Effects in Hypertext Systems
Sort
View
INFOCOM
2012
IEEE
13 years 4 months ago
Network optimization for DHT-based applications
—P2P platforms have been criticized because of the heavy strain that some P2P services can inflict on costly interdomain links of network operators. It is therefore necessary to...
Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Gu...
129
Voted
MOBISYS
2008
ACM
16 years 1 months ago
Micro power management of active 802.11 interfaces
Wireless interfaces are major power consumers on mobile systems. Considerable research has improved the energy efficiency of elongated idle periods or created more elongated idle ...
Jiayang Liu, Lin Zhong
INFOCOM
2005
IEEE
15 years 7 months ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
126
Voted
ESANN
2008
15 years 3 months ago
A method for robust variable selection with significance assessment
Our goal is proposing an unbiased framework for gene expression analysis based on variable selection combined with a significance assessment step. We start by discussing the need ...
Annalisa Barla, Sofia Mosci, Lorenzo Rosasco, Ales...
108
Voted
ACSAC
2009
IEEE
15 years 8 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...