Sciweavers

13489 search results - page 2599 / 2698
» Operating System
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 2 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
159
Voted
ICDE
2011
IEEE
265views Database» more  ICDE 2011»
14 years 8 months ago
RAFTing MapReduce: Fast recovery on the RAFT
MapReduce is a computing paradigm that has gained a lot of popularity as it allows non-expert users to easily run complex analytical tasks at very large-scale. At such scale, task...
Jorge-Arnulfo Quiané-Ruiz, Christoph Pinkel...
155
Voted
WWW
2005
ACM
16 years 5 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
MSWIM
2009
ACM
15 years 11 months ago
An enhanced mechanism for efficient assignment of multiple MBMS sessions towards LTE
The provision of rich multimedia services, such as Mobile TV, is considered of key importance for the Long Term Evolution (LTE) proliferation in mobile market. To this direction, ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
138
Voted
ICIP
2008
IEEE
15 years 11 months ago
On optimal royalty costs for video compression
Modern video compression includes a mature set of codecs, tools, and techniques that correspond to a variety of coding efficiencies and royalty costs in video delivery. In early ...
Ankur Saxena, Onur G. Guleryuz, M. Reha Civanlar
« Prev « First page 2599 / 2698 Last » Next »