Sciweavers

1804 search results - page 357 / 361
» Measuring denial Of service
Sort
View
MANSCI
2010
94views more  MANSCI 2010»
13 years 7 months ago
Contracting for Infrequent Restoration and Recovery of Mission-Critical Systems
Firms that rely on functioning mission-critical equipment for their businesses cannot a¤ord signi…cant operational downtime due to system disruptions. To minimize the impact of...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine,...
PVLDB
2010
159views more  PVLDB 2010»
13 years 7 months ago
Explore or Exploit? Effective Strategies for Disambiguating Large Databases
Data ambiguity is inherent in applications such as data integration, location-based services, and sensor monitoring. In many situations, it is possible to “clean”, or remove, ...
Reynold Cheng, Eric Lo, Xuan Yang, Ming-Hay Luk, X...
TPDS
2010
256views more  TPDS 2010»
13 years 7 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du
TPDS
2010
194views more  TPDS 2010»
13 years 7 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
TPDS
2010
87views more  TPDS 2010»
13 years 7 months ago
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation
Abstract—In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This crea...
Minghong Lin, John C. S. Lui, Dah-Ming Chiu