Sciweavers

20017 search results - page 3856 / 4004
» Using personas effectively
Sort
View
MSWIM
2006
ACM
15 years 9 months ago
Gateway adaptive pacing for TCP across multihop wireless networks and the Internet
In this paper, we introduce an effective congestion control scheme for TCP over hybrid wireless/wired networks comprising a multihop wireless IEEE 802.11 network and the wired Int...
Sherif M. ElRakabawy, Alexander Klemm, Christoph L...
128
Voted
PLDI
2006
ACM
15 years 9 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn
137
Voted
SAC
2006
ACM
15 years 9 months ago
Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer
: In chip design, one of the main objectives is to decrease its clock cycle; however, the existing approaches to timing analysis under uncertainty are based on fundamentally restri...
Michael Orshansky, Wei-Shen Wang, Martine Ceberio,...
145
Voted
SI3D
2006
ACM
15 years 9 months ago
Splatting indirect illumination
Global illumination provides a visual richness not achievable with the direct illumination models used by most interactive applications. To generate global effects, numerous appro...
Carsten Dachsbacher, Marc Stamminger
127
Voted
SIGCOMM
2006
ACM
15 years 9 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
« Prev « First page 3856 / 4004 Last » Next »