Sciweavers

1096 search results - page 168 / 220
» Computation Slicing: Techniques and Theory
Sort
View
ICNP
2006
IEEE
14 years 4 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
INFOCOM
2006
IEEE
14 years 4 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
SIGIR
2006
ACM
14 years 4 months ago
Improving the estimation of relevance models using large external corpora
Information retrieval algorithms leverage various collection statistics to improve performance. Because these statistics are often computed on a relatively small evaluation corpus...
Fernando Diaz, Donald Metzler
WIKIS
2006
ACM
14 years 4 months ago
Is there a space for the teacher in a WIKI?
In this paper we ask to what extent collective cognition can be supported and sustained in classroom practices. One major challenge for learning in technology-rich, collaborative ...
Andreas Lund, Ole Smørdal
WWW
2005
ACM
14 years 3 months ago
Improved timing control for web server systems using internal state information
How to effectively allocate system resource to meet the Service Level Agreement (SLA) of Web servers is a challenging problem. In this paper, we propose an improved scheme for aut...
Xue Liu, Rong Zheng, Jin Heo, Lui Sha