Sciweavers

123 search results - page 20 / 25
» A Study on Workload Characterization for a Web Proxy Server
Sort
View
PODS
2004
ACM
189views Database» more  PODS 2004»
14 years 7 months ago
The Lixto Data Extraction Project - Back and Forth between Theory and Practice
We present the Lixto project, which is both a research project in database theory and a commercial enterprise that develops Web data extraction (wrapping) and Web service definiti...
Georg Gottlob, Christoph Koch, Robert Baumgartner,...
JSAC
2007
59views more  JSAC 2007»
13 years 7 months ago
On scheduling of peer-to-peer video services
Abstract— Peer-to-peer (P2P) video systems provide a costeffective way for a large number of hosts to colloaborate for video sharing. Two features characterize such a system: 1) ...
Ying Cai, Ashwin Natarajan, Johnny Wong
ASAP
2007
IEEE
133views Hardware» more  ASAP 2007»
13 years 11 months ago
An Efficient Hardware Support for Control Data Validation
Software-based, fine-grain control flow integrity (CFI) validation technique has been proposed to enforce control flow integrity of program execution. By validating every indirect...
Yong-Joon Park, Zhao Zhang, Gyungho Lee
INFOCOM
2000
IEEE
13 years 12 months ago
Differentiated Multimedia Web Services Using Quality Aware Transcoding
—The ability of a web service to provide low-latency access to its contents is constrained by available network bandwidth. It is important for the service to manage available ban...
Surendar Chandra, Carla Schlatter Ellis, Amin Vahd...
CCS
2007
ACM
14 years 1 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks