Sciweavers

1846 search results - page 352 / 370
» Geographically-Sensitive Link Analysis
Sort
View
NSPW
2003
ACM
15 years 5 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
JCDL
2010
ACM
188views Education» more  JCDL 2010»
15 years 4 months ago
Exposing the hidden web for chemical digital libraries
In recent years, the vast amount of digitally available content has lead to the creation of many topic-centered digital libraries. Also in the domain of chemistry more and more di...
Sascha Tönnies, Benjamin Köhncke, Oliver...
ISCC
2002
IEEE
135views Communications» more  ISCC 2002»
15 years 4 months ago
End-to-end versus explicit feedback measurement in 802.11 networks
Higher layer protocols in wireless networks need to dynamically adapt to observed network response. The common approach is that each session employs end-to-end monitoring to estim...
Manthos Kazantzidis, Mario Gerla
STOC
2010
ACM
211views Algorithms» more  STOC 2010»
15 years 4 months ago
Distributed Computation in Dynamic Networks
In this paper we investigate distributed computation in dynamic networks in which the network topology changes from round to round. We consider a worst-case model in which the com...
Fabian Kuhn, Nancy Lynch and Rotem Oshman
IWDC
2001
Springer
140views Communications» more  IWDC 2001»
15 years 4 months ago
Satellite Systems Performance with TCP-IP Applications
Mobile Internet access is becoming extremely popular because users depend on the Internet for many activities in their daily routine. Satellites are well suited for mobile Interne...
Pierpaolo Loreti, Michele Luglio, Rohit Kapoor, J....