Sciweavers

1092 search results - page 153 / 219
» Understanding Context Before Using It
Sort
View
RAID
2005
Springer
14 years 1 months ago
Empirical Analysis of Rate Limiting Mechanisms
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting t...
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi W...
DMKD
2003
ACM
114views Data Mining» more  DMKD 2003»
14 years 1 months ago
Deriving link-context from HTML tag tree
HTML anchors are often surrounded by text that seems to describe the destination page appropriately. The text surrounding a link or the link-context is used for a variety of tasks...
Gautam Pant
ER
2003
Springer
150views Database» more  ER 2003»
14 years 29 days ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...
IWQOS
2001
Springer
14 years 5 days ago
Why Value Is Everything: A User-Centered Approach to Internet Quality of Service and Pricing
To create acceptable levels of Quality of Service (QoS), designers need to be able to predict users’ behaviour in response to different levels of QoS. However, predicting behavio...
Anna Bouch, Martina Angela Sasse
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
14 years 2 days ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho