Sciweavers

4676 search results - page 814 / 936
» Distributed networking system for Internet access service
Sort
View
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 4 months ago
Semantic Routing and Filtering for Large-Scale Video Streams Monitoring
In this paper, we propose a semantic routing and filtering framework for large-scale monitoring of video streams. Our goal is to build a distributed system that at any given time ...
Ching-Yung Lin, Olivier Verscheure, Lisa Amini
98
Voted
HPDC
1999
IEEE
15 years 3 months ago
Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters
In this paper, we present the design and implementation of Dodo, an e cient user-level system for harvesting idle memory in o -the-shelf clusters of workstations. Dodo enables dat...
Samir Koussih, Anurag Acharya, Sanjeev Setia
COMPUTER
2004
120views more  COMPUTER 2004»
14 years 11 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
CORR
2012
Springer
292views Education» more  CORR 2012»
13 years 6 months ago
Optimal Threshold Control by the Robots of Web Search Engines with Obsolescence of Documents
A typical web search engine consists of three principal parts: crawling engine, indexing engine, and searching engine. The present work aims to optimize the performance of the cra...
Konstantin Avrachenkov, Alexander N. Dudin, Valent...
ICDCS
2009
IEEE
15 years 8 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang