Sciweavers

1243 search results - page 193 / 249
» On the locality of bounded growth
Sort
View
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
16 years 1 months ago
Bypass Caching: Making Scientific Databases Good Network Citizens
Scientific database federations are geographically distributed and network bound. Thus, they could benefit from proxy caching. However, existing caching techniques are not suitabl...
Tanu Malik, Randal C. Burns, Amitabh Chaudhary
WWW
2006
ACM
16 years 16 days ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
VLSID
2003
IEEE
123views VLSI» more  VLSID 2003»
16 years 7 days ago
Synthesis of Real-Time Embedded Software by Timed Quasi-Static Scheduling
A formal synthesis method for complex real-time embedded software is proposed in this work. Compared to previous work, our method not only synthesizes embedded software with compl...
Pao-Ann Hsiung, Feng-Shi Su
OSDI
2008
ACM
16 years 5 days ago
Probabilistic Inference in Queueing Networks
Although queueing models have long been used to model the performance of computer systems, they are out of favor with practitioners, because they have a reputation for requiring u...
Charles A. Sutton, Michael I. Jordan
ICALP
2009
Springer
16 years 4 days ago
Testing Fourier Dimensionality and Sparsity
We present a range of new results for testing properties of Boolean functions that are defined in terms of the Fourier spectrum. Broadly speaking, our results show that the propert...
Parikshit Gopalan, Ryan O'Donnell, Rocco A. Served...