Sciweavers

427 search results - page 39 / 86
» Policies: Giving Users Control over Calls
Sort
View
JASIS
2006
164views more  JASIS 2006»
13 years 10 months ago
A study of interface support mechanisms for interactive information retrieval
Advances in search technology have meant that search systems can now offer assistance to users beyond simply retrieving a set of documents. For example, search systems are now cap...
Ryen W. White, Ian Ruthven
DIMVA
2007
13 years 11 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
CONEXT
2009
ACM
13 years 11 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
VLDB
1994
ACM
129views Database» more  VLDB 1994»
14 years 2 months ago
Hilbert R-tree: An Improved R-tree using Fractals
We propose a new R-tree structure that outperforms all the older ones. The heart of the idea is to facilitate the deferred splitting approach in R-trees. This is done by proposing...
Ibrahim Kamel, Christos Faloutsos
NETWORK
2007
132views more  NETWORK 2007»
13 years 9 months ago
Load balancing for cellular/WLAN integrated networks
– The interworking between the third-generation (3G) cellular network and wireless local area networks (WLANs) is one of the promising approaches to next-generation wireless netw...
Wei Song, Weihua Zhuang, Yu Cheng