Sciweavers

8493 search results - page 1603 / 1699
» Implementing a distributed firewall
Sort
View
SIGCOMM
2005
ACM
15 years 9 months ago
ExOR: opportunistic multi-hop routing for wireless networks
This paper describes ExOR, an integrated routing and MAC protocol that increases the throughput of large unicast transfers in multi-hop wireless networks. ExOR chooses each hop of...
Sanjit Biswas, Robert Morris
131
Voted
SIGIR
2005
ACM
15 years 9 months ago
A database centric view of semantic image annotation and retrieval
We introduce a new model for semantic annotation and retrieval from image databases. The new model is based on a probabilistic formulation that poses annotation and retrieval as c...
Gustavo Carneiro, Nuno Vasconcelos
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
15 years 9 months ago
Automatic measurement of memory hierarchy parameters
The running time of many applications is dominated by the cost of memory operations. To optimize such applications for a given platform, it is necessary to have a detailed knowled...
Kamen Yotov, Keshav Pingali, Paul Stodghill
126
Voted
SIGSOFT
2005
ACM
15 years 9 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
136
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
« Prev « First page 1603 / 1699 Last » Next »