Sciweavers

220 search results - page 42 / 44
» Understanding Peer-level Performance in BitTorrent: A Measur...
Sort
View
SIROCCO
2008
13 years 9 months ago
Remembering without Memory: Tree Exploration by Asynchronous Oblivious Robots
In the effort to understand the algorithmic limitations of computing by a swarm of robots, the research has focused on the minimal capabilities that allow a problem to be solved. ...
Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nic...
VEE
2010
ACM
204views Virtualization» more  VEE 2010»
13 years 7 months ago
Energy-efficient storage in virtual machine environments
Current trends in increasing storage capacity and virtualization of resources combined with the need for energy efficiency put a challenging task in front of system designers. Pre...
Lei Ye, Gen Lu, Sushanth Kumar, Chris Gniady, John...
25
Voted
CIKM
2009
Springer
14 years 2 months ago
Using multiple ontologies in information extraction
Ontology-Based Information Extraction (OBIE) has recently emerged as a subfield of Information Extraction (IE). Here, ontologies - which provide formal and explicit specificatio...
Daya C. Wimalasuriya, Dejing Dou
HT
2009
ACM
14 years 2 months ago
Interpreting the layout of web pages
Web pages such as news and shopping sites often use modular layouts. When used effectively this practice allows authors to present clearly large amounts of information in a single...
Luis Francisco-Revilla, Jeff Crow
IMC
2005
ACM
14 years 1 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei