Sciweavers

19130 search results - page 3529 / 3826
» Modelling multi-path problems
Sort
View
117
Voted
ESWS
2009
Springer
15 years 10 months ago
An Ontology of Resources: Solving the Identity Crisis
The primary goal of the Semantic Web is to use URIs as a universal space to name anything, expanding from using URIs for webpages to URIs for “real objects and imaginary concepts...
Harry Halpin, Valentina Presutti
111
Voted
SERSCISA
2009
Springer
15 years 10 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
163
Voted
SIGIR
2009
ACM
15 years 10 months ago
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects
Social tagging is becoming increasingly popular in many Web 2.0 applications where users can annotate resources (e.g. Web pages) with arbitrary keywords (i.e. tags). A tag recomme...
Ziyu Guan, Jiajun Bu, Qiaozhu Mei, Chun Chen, Can ...
142
Voted
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
15 years 10 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
134
Voted
PPOPP
2010
ACM
15 years 10 months ago
Thread to strand binding of parallel network applications in massive multi-threaded systems
In processors with several levels of hardware resource sharing, like CMPs in which each core is an SMT, the scheduling process becomes more complex than in processors with a singl...
Petar Radojkovic, Vladimir Cakarevic, Javier Verd&...
« Prev « First page 3529 / 3826 Last » Next »