Sciweavers

589 search results - page 108 / 118
» internet 2000
Sort
View
IMC
2007
ACM
13 years 10 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
LISA
2000
13 years 10 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
PDPTA
2000
13 years 10 months ago
An Economy Driven Resource Management Architecture for Global Computational Power Grids
The growing computational power requirements of grand challenge applications has promoted the need for linking highperformance computational resources distributed across multiple ...
Rajkumar Buyya, David Abramson, Jonathan Giddy
AI
2000
Springer
13 years 8 months ago
Wrapper induction: Efficiency and expressiveness
The Internet presents numerous sources of useful information--telephone directories, product catalogs, stock quotes, event listings, etc. Recently, many systems have been built th...
Nicholas Kushmerick
NAR
2000
127views more  NAR 2000»
13 years 8 months ago
The EMBL Nucleotide Sequence Database
The European Molecular Biology Laboratory (EMBL) Nucleotide Sequence Database (http://www.ebi.ac. uk/embl/index.html ) is maintained at the European Bioinformatics Institute (EBI)...
Wendy Baker, Alexandra van den Broek, Evelyn Camon...