Sciweavers

9604 search results - page 1864 / 1921
» The Duality of TIme and Information
Sort
View
WWW
2010
ACM
15 years 2 months ago
A characterization of online browsing behavior
In this paper, we undertake a large-scale study of online user behavior based on search and toolbar logs. We propose a new CCS taxonomy of pageviews consisting of Content (news, p...
Ravi Kumar, Andrew Tomkins
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
CISIS
2007
IEEE
15 years 2 months ago
Gridifying IBM's Generic Log Adapter to Speed-Up the Processing of Log Data
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis
ADHOC
2010
123views more  ADHOC 2010»
15 years 2 months ago
An analysis of the lifetime of OLSR networks
The Optimized Link State Routing (OLSR) protocol is a well-known route discovery protocol for ad-hoc networks. OLSR optimizes the flooding of link state information through the ne...
Jan-Maarten Verbree, Maurits de Graaf, Johann Huri...
ADHOC
2007
118views more  ADHOC 2007»
15 years 2 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...
« Prev « First page 1864 / 1921 Last » Next »