Sciweavers

16 search results - page 2 / 4
» Keynote Address
Sort
View
DASFAA
2006
IEEE
220views Database» more  DASFAA 2006»
14 years 1 months ago
KEYNOTE: Keyword Search by Node Selection for Text Retrieval on DHT-Based P2P Networks
Efficient full-text keyword search remains a challenging problem in P2P systems. Most of the traditional keyword search systems on DHT overlay networks perform the join operation ...
Zheng Zhang, Shuigeng Zhou, Weining Qian, Aoying Z...
WSC
1992
13 years 9 months ago
The Winter Simulation Conference: Celebrating Twenty-Five Years of Progress
In this paper we survey the past, present, and future of the Winter Simulation Conference (WSC) as well as the field of simulation. We begin by outlining the origins of WSC and it...
Robert C. Crain, Joseph M. Sussman, Thomas J. Schr...
CAS
2004
104views more  CAS 2004»
13 years 7 months ago
Why Model?
This lecture treats some enduring misconceptions about modeling. One of these is that the goal is always prediction. The lecture distinguishes between explanation and prediction a...
S. E. van der Leeuw
CCS
2000
ACM
14 years 2 days ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
WCRE
2006
IEEE
14 years 1 months ago
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations
In many areas of software engineering, empirical studies are playing an increasingly important role. This stems from the fact that software technologies are often based on heurist...
Lionel C. Briand