Sciweavers

7840 search results - page 1566 / 1568
» On generalized Ramsey numbers
Sort
View
CCS
2009
ACM
14 years 8 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 8 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny
PODS
2009
ACM
124views Database» more  PODS 2009»
14 years 8 months ago
Indexing uncertain data
Querying uncertain data has emerged as an important problem in data management due to the imprecise nature of many measurement data. In this paper we study answering range queries...
Pankaj K. Agarwal, Siu-Wing Cheng, Yufei Tao, Ke Y...
EUROSYS
2007
ACM
14 years 5 months ago
hFS: a hybrid file system prototype for improving small file and metadata performance
Two oft-cited file systems, the Fast File System (FFS) and the Log-Structured File System (LFS), adopt two sharply different update strategies—update-in-place and update-out-of-...
Zhihui Zhang, Kanad Ghose
EUROSYS
2006
ACM
14 years 1 months ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
« Prev « First page 1566 / 1568 Last » Next »