Sciweavers

3092 search results - page 8 / 619
» Where are you pointing
Sort
View
IMC
2010
ACM
13 years 5 months ago
YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective
In this paper we conduct an extensive and in-depth study of traffic exchanged between YouTube data centers and its users, as seen from the perspective of a tier-1 ISP in Spring 20...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
ICSE
2003
IEEE-ACM
14 years 7 months ago
Component Technology - What, Where, and How?
Software components, if usedproperly, ofj~r many software engineering benefits. Yet, they also pose many original challenges starting fi'om quality assurance and ranging to a...
Clemens A. Szyperski
CANDC
2005
ACM
13 years 9 months ago
The development of a cybernetic sculptor: Edward Ihnatowicz and the senster
Edward Ihnatowicz (1926-1988) built one of the world’s first computer-controlled robotic sculptures, The Senster, in 196870. Rather than concentrate entirely on this groundbreak...
Aleksandar Zivanovic
EUROPKI
2005
Springer
14 years 1 months ago
Recoverable and Untraceable E-Cash
In an electronic cash (e-cash) system, Recoverability means once you have lost your e-cash, you still can get back the amount of e-cash that you have lost. Untraceability means no ...
Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
PAM
2011
Springer
12 years 10 months ago
Internet Censorship in China: Where Does the Filtering Occur?
China filters Internet traffic in and out of the country. In order to circumvent the firewall, it is helpful to know where the filtering occurs. In this work, we explore the AS-...
Xueyang Xu, Zhuoqing Morley Mao, J. Alex Halderman