Sciweavers

4343 search results - page 815 / 869
» Replication Techniques for Availability
Sort
View
USENIX
2008
15 years 2 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
APSCC
2008
IEEE
15 years 1 months ago
ABSRP- A Service Discovery Approach for Vehicular Ad Hoc Networks
A vehicular ad-hoc network (VANET) is a network of intelligent vehicles that communicate with other vehicles in the network. The main objective of VANET is to provide comfort and ...
Brijesh Kadri Mohandas, Amiya Nayak, Kshirasagar N...
ATAL
2008
Springer
15 years 1 months ago
Resource constrained distributed constraint optimization using resource constraint free pseudo-tree
The Distributed Constraint Optimization Problem (DCOP) is a fundamental formalism for multi-agent cooperation. A dedicated framework called Resource Constrained DCOP (RCDCOP) has ...
Toshihiro Matsui, Marius Silaghi, Katsutoshi Hiray...
CCS
2008
ACM
15 years 1 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CIKM
2008
Springer
15 years 1 months ago
Translation enhancement: a new relevance feedback method for cross-language information retrieval
As an effective technique for improving retrieval effectiveness, relevance feedback (RF) has been widely studied in both monolingual and cross-language information retrieval (CLIR...
Daqing He, Dan Wu