Sciweavers

2409 search results - page 100 / 482
» Reverse engineering the Internet
Sort
View
IMC
2003
ACM
15 years 9 months ago
On inferring and characterizing internet routing policies
Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although ...
Feng Wang, Lixin Gao
SIGIR
2009
ACM
15 years 11 months ago
Good abandonment in mobile and PC internet search
Query abandonment by search engine users is generally considered to be a negative signal. In this paper, we explore the concept of good abandonment. We define a good abandonment ...
Jane Li, Scott B. Huffman, Akihito Tokuda
WWW
2004
ACM
16 years 5 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
INFOCOM
2003
IEEE
15 years 9 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
SAINT
2002
IEEE
15 years 9 months ago
On Updating in Very Short Time by Distributed Search Engines
Almost conventional search engines employ centralized architecture. However, such an engine is not suitable for fresh information retrieval because it spends a long time to collec...
Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai, Hi...