Sciweavers

30240 search results - page 5850 / 6048
» Robust System Design
Sort
View
159
Voted
CCS
2009
ACM
16 years 5 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
SIGMOD
2009
ACM
250views Database» more  SIGMOD 2009»
16 years 5 months ago
Query processing techniques for solid state drives
Solid state drives perform random reads more than 100x faster than traditional magnetic hard disks, while offering comparable sequential read and write bandwidth. Because of their...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
MOBISYS
2007
ACM
16 years 4 months ago
MobiSteer: using steerable beam directional antenna for vehicular network access
In this work, we investigate the use of directional antennas and beam steering techniques to improve performance of 802.11 links in the context of communication between a moving v...
Vishnu Navda, Anand Prabhu Subramanian, Kannan Dha...
NETWORK
2008
150views more  NETWORK 2008»
15 years 5 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
WWW
2003
ACM
16 years 5 months ago
Efficient URL caching for world wide web crawling
Crawling the web is deceptively simple: the basic algorithm is (a) Fetch a page (b) Parse it to extract all linked URLs (c) For all the URLs not seen before, repeat (a)?(c). Howev...
Andrei Z. Broder, Marc Najork, Janet L. Wiener
« Prev « First page 5850 / 6048 Last » Next »