Sciweavers

32545 search results - page 6408 / 6509
» Data Structures and Algorithms
Sort
View
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 9 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 9 months ago
Support Multi-version Applications in SaaS via Progressive Schema Evolution
— Update of applications in SaaS is expected to be a continuous efforts and cannot be done overnight or over the weekend. In such migration efforts, users are trained and shifted...
Jianfeng Yan, Bo Zhang
103
Voted
PLDI
2009
ACM
15 years 9 months ago
Error propagation analysis for file systems
Unchecked errors are especially pernicious in operating system file management code. Transient or permanent hardware failures are inevitable, and error-management bugs at the fi...
Cindy Rubio-González, Haryadi S. Gunawi, Be...
POPL
2009
ACM
15 years 9 months ago
Low-pain, high-gain multicore programming in Haskell: coordinating irregular symbolic computations on multicore architectures
With the emergence of commodity multicore architectures, exploiting tightly-coupled parallelism has become increasingly important. Functional programming languages, such as Haskel...
Abdallah Al Zain, Kevin Hammond, Jost Berthold, Ph...
SENSYS
2009
ACM
15 years 9 months ago
Collection tree protocol
This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson,...
« Prev « First page 6408 / 6509 Last » Next »