Sciweavers

2631 search results - page 475 / 527
» Less is More
Sort
View
MOBICOM
2005
ACM
14 years 3 months ago
Barrier coverage with wireless sensors
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Santosh Kumar, Ten-Hwang Lai, Anish Arora
SIGMETRICS
2005
ACM
105views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
An interposed 2-Level I/O scheduling framework for performance virtualization
I/O consolidation is a growing trend in production environments due to the increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to...
Jianyong Zhang, Anand Sivasubramaniam, Alma Riska,...
AADEBUG
2005
Springer
14 years 3 months ago
Automated bug isolation via program chipping
This paper introduces program chipping, a simple yet effective technique to isolate bugs. This technique automatically removes or chips away parts of a program so that the part t...
Chad D. Sterling, Ronald A. Olsson
CEAS
2005
Springer
14 years 3 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
FSMNLP
2005
Springer
14 years 3 months ago
German Compound Analysis with wfsc
Compounding is a very productive process in German to form complex nouns and adjectives which represent about 7% of the words of a newspaper text. Unlike English, German compounds ...
Anne Schiller