Sciweavers

869 search results - page 149 / 174
» Programming Internet Quality of Service
Sort
View
LISA
2000
15 years 3 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
WWW
2010
ACM
15 years 9 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
ICDE
2009
IEEE
126views Database» more  ICDE 2009»
15 years 9 months ago
Instant Advertising in Mobile Peer-to-Peer Networks
— To explore the benefit of advertising instant and location-aware commercials that can not be effectively promoted by traditional medium like TV program and Internet, we propos...
Zaiben Chen, Heng Tao Shen, Quanqing Xu, Xiaofang ...
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Maximizing the profit for cache replacement in a transcoding proxy
Recent technology advances in multimedia communication have ushered in a new era of personal communication. Users can ubiquitously access the Internet via various mobile devices. ...
Hao-Ping Hung, Ming-Syan Chen
CSMR
2010
IEEE
14 years 9 months ago
Automating Coverage Metrics for Dynamic Web Applications
Abstract--Building comprehensive test suites for web applications poses new challenges in software testing. Coverage criteria used for traditional systems to assess the quality of ...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean