Sciweavers

733 search results - page 99 / 147
» Measurements, Analysis, and Modeling of BitTorrent-like Syst...
Sort
View
IMC
2004
ACM
15 years 5 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
ICDAR
2005
IEEE
15 years 5 months ago
Document Ranking by Layout Relevance
This paper describes the development of a new document ranking system based on layout similarity. The user has a need represented by a set of ”wanted” documents, and the syste...
May Huang, Daniel DeMenthon, David S. Doermann, Ly...
ICSE
2000
IEEE-ACM
15 years 3 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
SG
2007
Springer
15 years 6 months ago
Correlating Text and Images: Concept and Evaluation
This paper presents the concept and an evaluation of a novel approach to support students to understand complex spatial relations and to learn unknown terms of a domain-specific t...
Timo Götzelmann, Pere-Pau Vázquez, Knu...
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 3 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...