Sciweavers

1084 search results - page 211 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
99
Voted
SAC
2004
ACM
15 years 5 months ago
Integrating similarity-based queries in image DBMSs
Until recently, issues in image retrieval have been handled in DBMSs and in computer vision as separate research works. Nowadays, the trend is towards integrating the two approach...
Solomon Atnafu, Richard Chbeir, David Coquil, Lion...
SIGMETRICS
2002
ACM
159views Hardware» more  SIGMETRICS 2002»
14 years 11 months ago
Limits of wide-area thin-client computing
While many application service providers have proposed using thin-client computing to deliver computational services over the Internet, little work has been done to evaluate the e...
Albert M. Lai, Jason Nieh
RECSYS
2009
ACM
15 years 6 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick
SIGCOMM
2004
ACM
15 years 5 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...
AHSWN
2006
206views more  AHSWN 2006»
14 years 11 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch