Sciweavers

2038 search results - page 48 / 408
» Loops under Strategies
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
Vamsi Paruchuri, Arjan Durresi, Raj Jain
INFOCOM
2006
IEEE
14 years 1 months ago
Considering Priority in Overlay Multicast Protocols Under Heterogeneous Environments
— Hosts participating in overlay multicast applications have a wide range of heterogeneity in bandwidth and participation characteristics. In this paper, we highlight and show th...
Michael A. Bishop, Sanjay G. Rao, Kunwadee Sripani...
CONEXT
2006
ACM
14 years 1 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...
UIST
2006
ACM
14 years 1 months ago
Under the table interaction
We explore the design space of a two-sided interactive touch table, designed to receive touch input from both the top and bottom surfaces of the table. By combining two registered...
Daniel Wigdor, Darren Leigh, Clifton Forlines, Sam...
BNCOD
2006
55views Database» more  BNCOD 2006»
13 years 9 months ago
On the Optimal Ordering of Maps, Selections, and Joins Under Factorization
We examine the problem of producing the optimal evaluation order for queries containing joins, selections, and maps. Specifically, we look at the case where common subexpressions i...
Thomas Neumann, Sven Helmer, Guido Moerkotte