Sciweavers

20017 search results - page 3856 / 4004
» Using personas effectively
Sort
View
121
Voted
MSWIM
2006
ACM
15 years 7 months ago
Gateway adaptive pacing for TCP across multihop wireless networks and the Internet
In this paper, we introduce an effective congestion control scheme for TCP over hybrid wireless/wired networks comprising a multihop wireless IEEE 802.11 network and the wired Int...
Sherif M. ElRakabawy, Alexander Klemm, Christoph L...
PLDI
2006
ACM
15 years 7 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn
SAC
2006
ACM
15 years 7 months ago
Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer
: In chip design, one of the main objectives is to decrease its clock cycle; however, the existing approaches to timing analysis under uncertainty are based on fundamentally restri...
Michael Orshansky, Wei-Shen Wang, Martine Ceberio,...
130
Voted
SI3D
2006
ACM
15 years 7 months ago
Splatting indirect illumination
Global illumination provides a visual richness not achievable with the direct illumination models used by most interactive applications. To generate global effects, numerous appro...
Carsten Dachsbacher, Marc Stamminger
SIGCOMM
2006
ACM
15 years 7 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
« Prev « First page 3856 / 4004 Last » Next »