Sciweavers

18451 search results - page 3556 / 3691
» Selecting the
Sort
View
COMBINATORICA
2007
129views more  COMBINATORICA 2007»
13 years 9 months ago
Birth control for giants
The standard Erd˝os-Renyi model of random graphs begins with n isolated vertices, and at each round a random edge is added. Parametrizing n 2 rounds as one time unit, a phase tra...
Joel H. Spencer, Nicholas C. Wormald
ISCA
2008
IEEE
119views Hardware» more  ISCA 2008»
13 years 9 months ago
Technology-Driven, Highly-Scalable Dragonfly Topology
Evolving technology and increasing pin-bandwidth motivate the use of high-radix routers to reduce the diameter, latency, and cost of interconnection networks. High-radix networks,...
John Kim, William J. Dally, Steve Scott, Dennis Ab...
COMCOM
2007
78views more  COMCOM 2007»
13 years 9 months ago
On TCP performance over asymmetric satellite links with real-time constraints
Real-time transmission over asymmetric satellite IP links is challenging, since satellite systems commonly exhibit long propagation delays, while bandwidth asymmetry often enforce...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
ISCI
2008
108views more  ISCI 2008»
13 years 9 months ago
Modeling and manipulating the structure of hierarchical schemas for the web
The Semantic Web is the next step of the current Web where information will become more machine-understandable to support effective data discovery and integration. Hierarchical sc...
Theodore Dalamagas, Alexandra Meliou, Timos K. Sel...
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
« Prev « First page 3556 / 3691 Last » Next »