Sciweavers

128 search results - page 19 / 26
» Forward Analysis of Depth-Bounded Processes
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
Vamsi Paruchuri, Arjan Durresi, Raj Jain
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
14 years 1 months ago
Composable Language Extensions for Computational Geometry: A Case Study
— This paper demonstrates how two different sets of powerful domain specific language features can be specified and deployed as composable language extensions. These extensions...
Eric Van Wyk, Eric Johnson
SSDBM
2006
IEEE
129views Database» more  SSDBM 2006»
14 years 22 days ago
Indexing Time-Evolving Data With Variable Lifetimes
Many applicationsstore data items for a pre-determined, finite length of time. Examples include slidingwindows over on-line data streams, where old data are dropped as the window...
Lukasz Golab, Piyush Prahladka, M. Tamer Özsu
ISCA
2005
IEEE
118views Hardware» more  ISCA 2005»
14 years 9 days ago
Continuous Optimization
This paper presents a hardware-based dynamic optimizer that continuously optimizes an application’s instruction stream. In continuous optimization, dataflow optimizations are p...
Brian Fahs, Todd M. Rafacz, Sanjay J. Patel, Steve...
WINE
2005
Springer
147views Economy» more  WINE 2005»
14 years 5 days ago
Optimal Starting Price in Online Auctions
Reserve price auctions are one of hot research topics in the traditional auction theory. Here we study the starting price in an online auction, counterpart of the public reserve pr...
Hai Yu, Shouyang Wang, Chuangyin Dang