Sciweavers

505 search results - page 78 / 101
» Message from General Co-Chairs
Sort
View
SIGCOMM
2006
ACM
14 years 2 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
WWW
2007
ACM
14 years 9 months ago
Learning information intent via observation
Workers in organizations frequently request help from assistants by sending request messages that express information intent: an intention to update data in an information system....
Anthony Tomasic, Isaac Simmons, John Zimmerman
WWW
2004
ACM
14 years 9 months ago
XQuery at your web service
XML messaging is at the heart of Web services, providing the flexibility required for their deployment, composition, and maintenance. Yet, current approaches to Web services devel...
Jérôme Siméon, Nicola Onose
MOBIHOC
2009
ACM
14 years 9 months ago
Delay and effective throughput of wireless scheduling in heavy traffic regimes: vacation model for complexity
Distributed scheduling algorithms for wireless ad hoc networks have received substantial attention over the last decade. The complexity levels of these algorithms span a wide spec...
Yung Yi, Junshan Zhang, Mung Chiang
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 3 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...