Sciweavers

203 search results - page 37 / 41
» The Good, the Bad, and the Ugly
Sort
View
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
The Wireless Hierarchical Token Bucket: A Channel Aware Scheduler for 802.11 Networks
The paper proposes an architecture for a scheduling algorithm, to be integrated in IEEE 802.11 Access Points (AP), able to take into account, besides the transport service class r...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
CLEF
2005
Springer
15 years 3 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...
IPTPS
2005
Springer
15 years 3 months ago
Evaluating DHT-Based Service Placement for Stream-Based Overlays
Stream-based overlay networks (SBONs) are one approach to implementing large-scale stream processing systems. A fundamental consideration in an SBON is that of service placement, ...
Peter R. Pietzuch, Jeffrey Shneidman, Jonathan Led...
IMC
2004
ACM
15 years 3 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
ICPP
2003
IEEE
15 years 2 months ago
A Hardware-based Cache Pollution Filtering Mechanism for Aggressive Prefetches
Aggressive hardware-based and software-based prefetch algorithms for hiding memory access latencies were proposed to bridge the gap of the expanding speed disparity between proces...
Xiaotong Zhuang, Hsien-Hsin S. Lee