Sciweavers

837 search results - page 145 / 168
» Simulation Based Approach to Evaluate a Distributed Search E...
Sort
View
SIGCOMM
2005
ACM
15 years 8 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
CIKM
2008
Springer
15 years 5 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
BMCBI
2008
130views more  BMCBI 2008»
15 years 3 months ago
FAF-Drugs2: Free ADME/tox filtering tool to assist drug discovery and chemical biology projects
Background: Drug discovery and chemical biology are exceedingly complex and demanding enterprises. In recent years there are been increasing awareness about the importance of pred...
David Lagorce, Olivier Sperandio, Hervé Gal...
XPU
2005
Springer
15 years 8 months ago
Agile Methods for Embedded Systems
The main goal to be answered by this Ph.D. thesis is whether there is a potential for a successful and powerful application of agile methods and related techniques to embedded syst...
Dirk Wilking
AOSD
2010
ACM
15 years 10 months ago
Tracking code patterns over multiple software versions with Herodotos
An important element of understanding a software code base is to identify the repetitive patterns of code it contains and how these evolve over time. Some patterns are useful to t...
Nicolas Palix, Julia L. Lawall, Gilles Muller