Sciweavers

4867 search results - page 913 / 974
» Fluid Models in Performance Analysis
Sort
View
112
Voted
SIGIR
2006
ACM
15 years 6 months ago
Type less, find more: fast autocompletion search with a succinct index
We consider the following full-text search autocompletion feature. Imagine a user of a search engine typing a query. Then with every letter being typed, we would like an instant d...
Holger Bast, Ingmar Weber
ITCC
2005
IEEE
15 years 6 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
APSEC
2003
IEEE
15 years 6 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
92
Voted
ICDCS
2003
IEEE
15 years 6 months ago
Collision Avoidance in Single-Channel Ad Hoc Networks Using Directional Antennas
Three collision-avoidance protocols are analyzed that use omni-directional packet reception together with omnidirectional transmissions, directional transmissions, or a combinatio...
Yu Wang, J. J. Garcia-Luna-Aceves
98
Voted
CCS
2003
ACM
15 years 6 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson