Sciweavers

2494 search results - page 166 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
NDSS
2002
IEEE
14 years 27 days ago
Implementing Pushback: Router-Based Defense Against DDoS Attacks
Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congest...
John Ioannidis, Steven M. Bellovin
CCGRID
2003
IEEE
14 years 1 months ago
Using grid technologies to face medical image analysis challenges
The availability of digital imagers inside hospitals and their ever growing inspection capabilities have established digital medical images as a key component of many pathologies ...
Johan Montagnat, Vincent Breton, Isabelle E. Magni...
DEXA
2010
Springer
187views Database» more  DEXA 2010»
13 years 6 months ago
Pivot Selection Method for Optimizing both Pruning and Balancing in Metric Space Indexes
We researched to try to find a way to reduce the cost of nearest neighbor searches in metric spaces. Many similarity search indexes recursively divide a region into subregions by u...
Hisashi Kurasawa, Daiji Fukagawa, Atsuhiro Takasu,...
OSDI
2006
ACM
14 years 8 months ago
Operating System Profiling via Latency Analysis
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...
DLOG
2008
13 years 10 months ago
Identifying Objects Over Time with Description Logics
A fundamental requirement for cooperating agents is to agree on a selection of component values of objects that can be used for reliably communicating references to the objects, to...
David Toman, Grant E. Weddell