Sciweavers

26354 search results - page 24 / 5271
» How we refactor, and how we know it
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos
CEAS
2004
Springer
14 years 1 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li
EUROPAR
2005
Springer
14 years 1 months ago
Faults in Large Distributed Systems and What We Can Do About Them
Scientists are increasingly using large distributed systems built from commodity off-the-shelf components to perform scientific computation. Grid computing has expanded the scale ...
George Kola, Tevfik Kosar, Miron Livny
GRAPHICSINTERFACE
2000
13 years 9 months ago
Are We All In the Same "Bloat"?
"Bloat", a term that has existed in the technical community for many years, has recently received attention in the popular press. The term has a negative connotation imp...
Joanna McGrenere, Gale Moore
CHI
2009
ACM
14 years 8 months ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...