Sciweavers

3891 search results - page 660 / 779
» Query Models
Sort
View
101
Voted
PET
2007
Springer
15 years 8 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
105
Voted
SAC
2005
ACM
15 years 8 months ago
LighTS: a lightweight, customizable tuple space supporting context-aware applications
The tuple space model inspired by Linda has recently been rediscovered by distributed middleware. Moreover, some researchers also applied it in the challenging scenarios involving...
Gian Pietro Picco, Davide Balzarotti, Paolo Costa
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
15 years 8 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
ICDT
2005
ACM
131views Database» more  ICDT 2005»
15 years 8 months ago
Algorithms for the Database Layout Problem
We present a formal analysis of the database layout problem, i.e., the problem of determining how database objects such as tables and indexes are assigned to disk drives. Optimizin...
Gagan Aggarwal, Tomás Feder, Rajeev Motwani...
VLDB
2005
ACM
126views Database» more  VLDB 2005»
15 years 8 months ago
Hubble: An Advanced Dynamic Folder Technology for XML
A significant amount of information is stored in computer systems today, but people are struggling to manage their documents such that the information is easily found. XML is a de...
Ning Li, Joshua Hui, Hui-I Hsiao, Kevin S. Beyer