Sciweavers

1860 search results - page 226 / 372
» Jiro Storage Management
Sort
View
IMC
2007
ACM
15 years 5 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
INFOSCALE
2007
ACM
15 years 5 months ago
Query-driven indexing for scalable peer-to-peer text retrieval
We present a query-driven algorithm for the distributed indexing of large document collections within structured P2P networks. To cope with bandwidth consumption that has been ide...
Gleb Skobeltsyn, Toan Luu, Ivana Podnar Zarko, Mar...
143
Voted
BMCBI
2008
81views more  BMCBI 2008»
15 years 4 months ago
A perspective for biomedical data integration: Design of databases for flow cytometry
Background: The integration of biomedical information is essential for tackling medical problems. We describe a data model in the domain of flow cytometry (FC) allowing for massiv...
John Drakos, Marina Karakantza, Nicholas C. Zoumbo...
175
Voted
VEE
2009
ACM
171views Virtualization» more  VEE 2009»
15 years 11 months ago
Dynamic memory balancing for virtual machines
Virtualization essentially enables multiple operating systems and applications to run on one physical computer by multiplexing hardware resources. A key motivation for applying vi...
Weiming Zhao, Zhenlin Wang
PLDI
2005
ACM
15 years 9 months ago
Garbage collection without paging
Garbage collection offers numerous software engineering advantages, but interacts poorly with virtual memory managers. Existing garbage collectors require far more pages than the ...
Matthew Hertz, Yi Feng, Emery D. Berger