Sciweavers

2875 search results - page 509 / 575
» Distributed Reactive Machines
Sort
View
FORTE
2000
15 years 3 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...
135
Voted
WSC
1997
15 years 3 months ago
AutoMod Tutorial
The AutoModTM simulation system differs significantly from other systems because of its ability to deal with the physical elements of a system in physical (graphical) terms and th...
Matthew W. Rohrer
136
Voted
CIDR
2009
157views Algorithms» more  CIDR 2009»
15 years 3 months ago
SCADS: Scale-Independent Storage for Social Computing Applications
Collaborative web applications such as Facebook, Flickr and Yelp present new challenges for storing and querying large amounts of data. As users and developers are focused more on...
Michael Armbrust, Armando Fox, David A. Patterson,...
DIMVA
2009
15 years 3 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
112
Voted
MM
2010
ACM
198views Multimedia» more  MM 2010»
15 years 2 months ago
Analyzing and predicting sentiment of images on the social web
In this paper we study the connection between sentiment of images expressed in metadata and their visual content in the social photo sharing environment Flickr. To this end, we co...
Stefan Siersdorfer, Enrico Minack, Fan Deng, Jonat...