Sciweavers

9124 search results - page 1712 / 1825
» Requirements-Based Design Evaluation
Sort
View
112
Voted
SIGCOMM
2006
ACM
15 years 6 months ago
Beyond bloom filters: from approximate membership checks to approximate state machines
Many networking applications require fast state lookups in a concurrent state machine, which tracks the state of a large number of flows simultaneously. We consider the question ...
Flavio Bonomi, Michael Mitzenmacher, Rina Panigrah...
115
Voted
SIGCOMM
2006
ACM
15 years 6 months ago
Interference-aware fair rate control in wireless sensor networks
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
Sumit Rangwala, Ramakrishna Gummadi, Ramesh Govind...
106
Voted
SIGCSE
2006
ACM
146views Education» more  SIGCSE 2006»
15 years 6 months ago
Introductory game creation: no programming required
Many incoming college freshmen have accumulated a significant number of hours of experience playing computer games. Extending that experience to actual game creation activities ca...
A. T. Chamillard
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
SIGUCCS
2006
ACM
15 years 6 months ago
Because we have better things to do: automating common support tasks
As technology permeates more aspects of our everyday lives, greater demands are placed on information technology personnel. Lehigh University computing consultants have found thei...
Keith B. Erekson, Stephen G. Lewis
« Prev « First page 1712 / 1825 Last » Next »