Sciweavers

1265 search results - page 250 / 253
» Randomized Algorithms and Probabilistic Analysis in Wireless...
Sort
View
122
Voted
CCS
2004
ACM
15 years 8 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
140
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budget
—Collecting per-flow aggregates in high-speed links is challenging and usually requires traffic sampling to handle peak rates and extreme traffic mixes. Static selection of sa...
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Nick...
SIGMETRICS
2010
ACM
173views Hardware» more  SIGMETRICS 2010»
15 years 7 months ago
Channel fragmentation in dynamic spectrum access systems: a theoretical study
Dynamic Spectrum Access systems exploit temporarily available spectrum (‘white spaces’) and can spread transmissions over a number of non-contiguous sub-channels. Such methods...
Edward G. Coffman Jr., Philippe Robert, Florian Si...
112
Voted
CN
2008
100views more  CN 2008»
15 years 2 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
135
Voted
WWW
2008
ACM
16 years 3 months ago
Exploring social annotations for information retrieval
Social annotation has gained increasing popularity in many Web-based applications, leading to an emerging research area in text analysis and information retrieval. This paper is c...
Ding Zhou, Jiang Bian, Shuyi Zheng, Hongyuan Zha, ...