Sciweavers

4052 search results - page 758 / 811
» Using RDF to describe networks
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 11 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
TCS
2002
13 years 10 months ago
Process algebra for performance evaluation
This paper surveys the theoretical developments in the field of stochastic process algebras, process algebras where action occurrences may be subject to a delay that is determined...
Holger Hermanns, Ulrich Herzog, Joost-Pieter Katoe...
WWW
2006
ACM
14 years 12 months ago
Selective early request termination for busy internet services
Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies a load shedding mechanism called...
Jingyu Zhou, Tao Yang
POPL
2009
ACM
14 years 11 months ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
CHI
2005
ACM
14 years 11 months ago
Harnessing mobile ubiquitous video
We are rapidly moving toward a world where personal networked video cameras are ubiquitous. Already, camera-equipped cell phones are becoming commonplace. Imagine being able to ta...
Neil J. McCurdy, Jennifer N. Carlisle, William G. ...