Sciweavers

737 search results - page 57 / 148
» Improving Access to Large Volumes of Online Data
Sort
View
ASPLOS
2009
ACM
15 years 6 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
TMC
2010
179views more  TMC 2010»
15 years 10 days ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
IPPS
1999
IEEE
15 years 6 months ago
The Characterization of Data-Accumulating Algorithms
A data-accumulating algorithm (d-algorithm for short) works on an input considered as a virtually endless stream. The computation terminates when all the currently arrived data ha...
Stefan D. Bruda, Selim G. Akl
MIDDLEWARE
2010
Springer
15 years 12 days ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
MINENET
2005
ACM
15 years 7 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...