Sciweavers

3155 search results - page 201 / 631
» How Are You Doing
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
LCN
2008
IEEE
14 years 3 months ago
On measuring available bandwidth in wireless networks
Abstract— BART is a state-of-the-art active end-to-end bandwidth measurement method that estimates not only the available bandwidth but also the link capacity of the bottleneck l...
Andreas Johnsson, Mats Björkman
BROADNETS
2007
IEEE
14 years 3 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
14 years 3 months ago
Convergence phases, variance trajectories, and runtime analysis of continuous EDAs
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
Jörn Grahl, Peter A. N. Bosman, Stefan Minner
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 3 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch