Sciweavers

6770 search results - page 1051 / 1354
» How GPUs Work
Sort
View
CCS
2003
ACM
15 years 7 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
CIAC
2003
Springer
98views Algorithms» more  CIAC 2003»
15 years 7 months ago
Improving Customer Proximity to Railway Stations
Abstract. We consider problems of (new) station placement along (existing) railway tracks, so as to increase the number of users. We prove that, in spite of the NP-hardness for the...
Evangelos Kranakis, Paolo Penna, Konrad Schlude, D...
DBISP2P
2003
Springer
105views Database» more  DBISP2P 2003»
15 years 7 months ago
Distributed Queries and Query Optimization in Schema-Based P2P-Systems
Databases have employed a schema-based approach to store and retrieve structured data for decades. For peer-to-peer (P2P) networks, similar approaches are just beginning to emerge,...
Ingo Brunkhorst, Hadhami Dhraief, Alfons Kemper, W...
105
Voted
DIGRA
2003
Springer
15 years 7 months ago
Ka as shomin-geki: Problematizing videogame studies
The paper addresses limitations of strictly interactive theories of videogame genre, proposes a supplementary, historicist inter-media alternative, and interprets the videogame Ka...
William Huber
ERSHOV
2003
Springer
15 years 7 months ago
Data Mappings in the Model-View-Controller Pattern
The model-view-controller pattern is used to keep a data model and its views consistent. Usually there is a one-to-one correspondence between the data in the model and its represen...
Martin Rammerstorfer, Hanspeter Mössenbö...
« Prev « First page 1051 / 1354 Last » Next »