Sciweavers

4761 search results - page 721 / 953
» Generalizing Boundary Points
Sort
View
INFOCOM
2002
IEEE
15 years 9 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ISSS
2002
IEEE
148views Hardware» more  ISSS 2002»
15 years 9 months ago
A Case Study of Hardware and Software Synthesis in ForSyDe
ForSyDe (FORmal SYstem DEsign) is a methodology which addresses the design of SoC applications which may contain control as well as data flow dominated parts. Starting with a for...
Ingo Sander, Axel Jantsch, Zhonghai Lu
VISUALIZATION
2002
IEEE
15 years 9 months ago
QuadTIN: Quadtree based Triangulated Irregular Networks
Interactive visualization of large digital elevation models is of continuing interest in scientific visualization, GIS, and virtual reality applications. Taking advantage of the r...
Renato Pajarola, Marc Antonijuan, Roberto Lario
128
Voted
SIGECOM
2010
ACM
140views ECommerce» more  SIGECOM 2010»
15 years 9 months ago
Northern exposure: a field experiment measuring externalities between search advertisements
“North” ads, or sponsored listings appearing just above the organic search results, generate the majority of clicks and revenues for search engines. In this paper, we ask whet...
David H. Reiley, Sai-Ming Li, Randall A. Lewis
SPAA
2010
ACM
15 years 9 months ago
Parallel approximation algorithms for facility-location problems
This paper presents the design and analysis of parallel approximation algorithms for facility-location problems, including NC and RNC algorithms for (metric) facility location, k-...
Guy E. Blelloch, Kanat Tangwongsan