Sciweavers

24188 search results - page 4728 / 4838
» Computing on Encrypted Data
Sort
View
SENSYS
2004
ACM
15 years 10 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
SIGCOMM
2004
ACM
15 years 10 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
SIGCOMM
2004
ACM
15 years 10 months ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...
SIGCOMM
2004
ACM
15 years 10 months ago
CapProbe: a simple and accurate capacity estimation technique
We present a new capacity estimation technique, called CapProbe. CapProbe combines delay as well as dispersion measurements of packet pairs to filter out samples distorted by cro...
Rohit Kapoor, Ling-Jyh Chen, Li Lao, Mario Gerla, ...
SIGIR
2004
ACM
15 years 10 months ago
On scaling latent semantic indexing for large peer-to-peer systems
The exponential growth of data demands scalable infrastructures capable of indexing and searching rich content such as text, music, and images. A promising direction is to combine...
Chunqiang Tang, Sandhya Dwarkadas, Zhichen Xu
« Prev « First page 4728 / 4838 Last » Next »