Sciweavers

6652 search results - page 1255 / 1331
» On the effective evaluation of TCP
Sort
View
CCS
2008
ACM
13 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CGO
2008
IEEE
13 years 11 months ago
Comprehensive path-sensitive data-flow analysis
Data-flow analysis is an integral part of any aggressive optimizing compiler. We propose a framework for improving the precision of data-flow analysis in the presence of complex c...
Aditya V. Thakur, R. Govindarajan
CIKM
2008
Springer
13 years 11 months ago
Dr. Searcher and Mr. Browser: a unified hyperlink-click graph
We introduce a unified graph representation of the Web, which includes both structural and usage information. We model this graph using a simple union of the Web's hyperlink ...
Barbara Poblete, Carlos Castillo, Aristides Gionis
CIKM
2008
Springer
13 years 11 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
CIKM
2008
Springer
13 years 11 months ago
MedSearch: a specialized search engine for medical information retrieval
People are thirsty for medical information. Existing Web search engines often cannot handle medical search well because they do not consider its special requirements. Often a medi...
Gang Luo, Chunqiang Tang, Hao Yang, Xing Wei
« Prev « First page 1255 / 1331 Last » Next »