Sciweavers

8772 search results - page 1698 / 1755
» Business Services Networks
Sort
View
QUESTA
2011
12 years 12 months ago
Uniform approximations for the M/G/1 queue with subexponential processing times
: This paper studies the asymptotic behavior of the steady-state waiting time, W∞, of the M/G/1 queue with subexponenential processing times for different combinations of traffi...
Mariana Olvera-Cravioto, Peter W. Glynn
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 8 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
INFOCOM
2012
IEEE
11 years 11 months ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
CVPR
2012
IEEE
11 years 11 months ago
Urban tribes: Analyzing group photos from a social perspective
The explosive growth in image sharing via social networks has produced exciting opportunities for the computer vision community in areas including face, text, product and scene re...
Ana C. Murillo, Iljung S. Kwak, Lubomir Bourdev, D...
EDBT
2012
ACM
216views Database» more  EDBT 2012»
11 years 11 months ago
Effectively indexing the multi-dimensional uncertain objects for range searching
The range searching problem is fundamental in a wide spectrum of applications such as radio frequency identification (RFID) networks, location based services (LBS), and global po...
Ying Zhang, Wenjie Zhang, Qianlu Lin, Xuemin Lin
« Prev « First page 1698 / 1755 Last » Next »