Sciweavers

139 search results - page 15 / 28
» Googling considered harmful
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
P2P-TV Systems under Adverse Network Conditions: A Measurement Study
Abstract—In this paper we define a simple experimental setup to analyze the behavior of commercial P2P-TV applications under adverse network conditions. Our goal is to reveal th...
Eugenio Alessandria, Massimo Gallo, Emilio Leonard...
ISAAC
2009
Springer
83views Algorithms» more  ISAAC 2009»
14 years 4 months ago
Deletion without Rebalancing in Multiway Search Trees
Many database systems that use a B+ tree as the underlying data structure do not do rebalancing on deletion. This means that a bad sequence of deletions can create a very unbalance...
Siddhartha Sen, Robert Endre Tarjan
INFOCOM
2008
IEEE
14 years 4 months ago
Information Concealing Games
— Consider the situation in which a decision maker (Actor) has to decide which of several available resources to use in the presence of an adversary (called Controller) that can ...
Saswati Sarkar, Eitan Altman, Rachid El Azouzi, Ye...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 4 months ago
Adaptive Systems Require Adaptive Support--When Tools Attack!
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
Jennifer Baldwin, Yvonne Coady
CLUSTER
2005
IEEE
14 years 3 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny