Sciweavers

680 search results - page 43 / 136
» Locating Hidden Servers
Sort
View
SIGMOD
2002
ACM
124views Database» more  SIGMOD 2002»
14 years 10 months ago
Middle-tier database caching for e-business
Scaling up to the enormous and growing Internet population with unpredictable usage patterns, Ecommerce applications face severe challenges in cost and manageability, especially f...
Qiong Luo, Sailesh Krishnamurthy, C. Mohan, Hamid ...
MDM
2007
Springer
195views Communications» more  MDM 2007»
14 years 4 months ago
BORA: Routing and Aggregation for Distributed Processing of Spatio-Temporal Range Queries
This work tackles the problem of answer-aggregation for continuous spatio-temporal range queries in distributed settings. We assume a grid-like coverage of the spatial universe of...
Goce Trajcevski, Hui Ding, Peter Scheuermann, Isab...
DEBS
2003
ACM
14 years 3 months ago
Client mobility in rendezvous-notify
Event-based computing is vital for the next generation mobile services and applications that need to meet user requirements irrespective of time and location. The event paradigm i...
Sasu Tarkoma, Jaakko Kangasharju, Kimmo E. E. Raat...
INFOCOM
2000
IEEE
14 years 2 months ago
Prefetching the Means for Document Transfer: A New Approach for Reducing Web Latency
User-perceived latency is recognized as the central performance problem in the Web. We systematically measure factors contributing to this latency, across several locations. Our s...
Edith Cohen, Haim Kaplan
TSE
2010
230views more  TSE 2010»
13 years 5 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...