Sciweavers

1127 search results - page 90 / 226
» New Algorithms for Generalized Network Flows
Sort
View
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
15 years 11 months ago
Randomized Synopses for Query Assurance on Data Streams
The overwhelming flow of information in many data stream applications forces many companies to outsource to a third-party the deployment of a Data Stream Management System (DSMS) f...
Ke Yi, Feifei Li, Marios Hadjieleftheriou, George ...
DAC
2006
ACM
15 years 11 months ago
Optimality study of resource binding with multi-Vdds
Deploying multiple supply voltages (multi-Vdds) on one chip is an important technique to reduce dynamic power consumption. In this work we present an optimality study for resource...
Deming Chen, Jason Cong, Yiping Fan, Junjuan Xu
CCS
2003
ACM
15 years 3 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ICNP
2005
IEEE
15 years 4 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
GLOBECOM
2010
IEEE
14 years 8 months ago
Hybrid Window and Rate Based Congestion Control for Delay Sensitive Applications
There has been a dramatic increase in interactive cloud based software applications. Compared to classical realtime media applications (voice over IP (VoIP)/conferencing) and non r...
Sanjeev Mehrotra, Jin Li, Sudipta Sengupta, Manish...