Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Abstract-- The ability to automatically detect visually interesting regions in images has many practical applications, especially in the design of active machine vision and automat...
Umesh Rajashekar, Ian van der Linde, Alan C. Bovik...
We consider experiments to measure the quality of a web search algorithm based on how much total time users take to complete assigned search tasks using that algorithm. We first ...
In this paper we study the impact of sharing memory resources on five Google datacenter applications: a web search engine, bigtable, content analyzer, image stitching, and protoc...
Lingjia Tang, Jason Mars, Neil Vachharajani, Rober...
Although there is tremendous interest in designing improved networks for data centers, very little is known about the network-level traffic characteristics of current data centers...