Sciweavers

3531 search results - page 451 / 707
» Virtualizing Disk Performance
Sort
View
CCS
2010
ACM
15 years 2 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
148
Voted
TPDS
2008
188views more  TPDS 2008»
15 years 2 months ago
Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks
We study efficient interference-aware joint routing and TDMA link scheduling for a multihop wireless network to maximize its throughput. Efficient link scheduling can greatly reduc...
Yu Wang 0003, Weizhao Wang, Xiang-Yang Li, Wen-Zha...
138
Voted
PAMI
2007
245views more  PAMI 2007»
15 years 2 months ago
Conformal Geometry and Its Applications on 3D Shape Matching, Recognition, and Stitching
—Three-dimensional shape matching is a fundamental issue in computer vision with many applications such as shape registration, 3D object recognition, and classification. However,...
Sen Wang, Yang Wang, Miao Jin, Xianfeng David Gu, ...
PVLDB
2008
110views more  PVLDB 2008»
15 years 2 months ago
Online maintenance of very large random samples on flash storage
Recent advances in flash media have made it an attractive alternative for data storage in a wide spectrum of computing devices, such as embedded sensors, mobile phones, PDA's...
Suman Nath, Phillip B. Gibbons
137
Voted
PE
2010
Springer
140views Optimization» more  PE 2010»
15 years 1 months ago
KPC-Toolbox: Best recipes for automatic trace fitting using Markovian Arrival Processes
We present the KPC-Toolbox, a library of MATLAB scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way based on the recently proposed Kro...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni