Sciweavers

470 search results - page 66 / 94
» From evidence-based policy making to policy analytics
Sort
View
88
Voted
JSW
2008
101views more  JSW 2008»
15 years 12 days ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
87
Voted
CN
2002
116views more  CN 2002»
15 years 8 days ago
Avoiding congestion collapse on the Internet using TCP tunnels
This paper discusses the application of TCP tunnels on the Internet and how Internet traffic can benefit from the congestion control mechanism of the tunnels. Primarily, we show t...
Boon Peng Lee, Rajesh Krishna Balan, Lillykutty Ja...
93
Voted
JIS
2008
119views more  JIS 2008»
14 years 12 months ago
A three-year study on the freshness of web search engine databases
This paper deals with one aspect of the index quality of search engines: index freshness. The purpose is to analyse the update strategies of the major Web search engines Google, Y...
Dirk Lewandowski
IMC
2006
ACM
15 years 6 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
116
Voted
IEEEPACT
2008
IEEE
15 years 6 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...