Sciweavers

1505 search results - page 300 / 301
» Boosting the Availability of Information Systems by Data Rep...
Sort
View
CCS
2004
ACM
14 years 29 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
VLDB
2001
ACM
190views Database» more  VLDB 2001»
13 years 12 months ago
LEO - DB2's LEarning Optimizer
Most modern DBMS optimizers rely upon a cost model to choose the best query execution plan (QEP) for any given query. Cost estimates are heavily dependent upon the optimizer’s e...
Michael Stillger, Guy M. Lohman, Volker Markl, Mok...
GLOBECOM
2009
IEEE
13 years 11 months ago
Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning
In this paper, cognitive transmission under quality of service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sen...
Sami Akin, Mustafa Cenk Gursoy
SIGCOMM
1991
ACM
13 years 11 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
IADIS
2004
13 years 9 months ago
Solving Crossword Puzzles via the Google API
The GoogleTM API enables software agents to query and use search results from the large collections of data available via the ever-popular Google search engine. Web searches using...
David E. Goldschmidt, Mukkai S. Krishnamoorthy