Sciweavers

350 search results - page 51 / 70
» Improving application security with data flow assertions
Sort
View
CCR
2010
179views more  CCR 2010»
13 years 7 months ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...
SAC
2005
ACM
14 years 1 months ago
SVD-based collaborative filtering with privacy
Collaborative ļ¬ltering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
WCE
2007
13 years 9 months ago
QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing
ā€”Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity within the next few years. There are too many applications where one-t...
Vida Lashkari B. O., Mehdi Dehghan
DS
1997
104views Database» more  DS 1997»
13 years 9 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
CONCURRENCY
2007
70views more  CONCURRENCY 2007»
13 years 7 months ago
Fostering collaboration to better manage water resources
: Good water management is literally vital for the arid and semi-arid regions of the planet. Yet good water management requires multidisciplinary expertise, since one must consider...
William Voorsluys, Eliane Araújo, Walfredo ...