Sciweavers

520 search results - page 98 / 104
» Truthful Mechanisms for Exhibitions
Sort
View
CCS
2006
ACM
15 years 1 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
NGC
2000
Springer
114views Communications» more  NGC 2000»
15 years 1 months ago
FLID-DL
Abstract--We describe fair layered increase/decrease with dynamic layering (FLID-DL): a new multirate congestion control algorithm for layered multicast sessions. FLID-DL generaliz...
John W. Byers, Michael Frumin, Gavin B. Horn, Mich...
ICDT
1995
ACM
96views Database» more  ICDT 1995»
15 years 1 months ago
On Two Forms of Structural Recursion
We investigate and compare two forms of recursion on sets for querying nested collections. The rst one is called sri and it corresponds to sequential processing of data. The second...
Dan Suciu, Limsoon Wong
ISCA
1995
IEEE
98views Hardware» more  ISCA 1995»
15 years 1 months ago
Instruction Fetching: Coping with Code Bloat
Previous research has shown that the SPEC benchmarks achieve low miss ratios in relatively small instruction caches. This paper presents evidence that current software-development...
Richard Uhlig, David Nagle, Trevor N. Mudge, Stuar...
CCGRID
2009
IEEE
15 years 24 days ago
The Grid Enablement and Sustainable Simulation of Multiscale Physics Applications
The understanding of H diffusion in materials is pivotal to designing suitable processes. Though a nudged elastic band (NEB)+molecular dynamics (MD)/quantum mechanics (QM) algori...
Yingwen Song, Yoshio Tanaka, Hiroshi Takemiya, Aii...