Sciweavers

154 search results - page 30 / 31
» New results on web caching with request reordering
Sort
View
OSDI
2002
ACM
15 years 10 months ago
An Analysis of Internet Content Delivery Systems
In the span of only a few years, the Internet has experienced an astronomical increase in the use of specialized content delivery systems, such as content delivery networks and pe...
Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn...
102
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
CIKM
2010
Springer
14 years 8 months ago
Visual cube and on-line analytical processing of images
On-Line Analytical Processing (OLAP) has shown great success in many industry applications, including sales, marketing, management, financial data analysis, etc. In this paper, w...
Xin Jin, Jiawei Han, Liangliang Cao, Jiebo Luo, Bo...
78
Voted
ACMMSP
2004
ACM
92views Hardware» more  ACMMSP 2004»
15 years 3 months ago
Instruction combining for coalescing memory accesses using global code motion
Instruction combining is an optimization to replace a sequence of instructions with a more efficient instruction yielding the same result in a fewer machine cycles. When we use it...
Motohiro Kawahito, Hideaki Komatsu, Toshio Nakatan...
76
Voted
WWW
2009
ACM
15 years 10 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...