• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,376
Next 10 →

Promoting the Use of End-to-End Congestion Control in the Internet

by Sally Floyd, Kevin Fall - IEEE/ACM TRANSACTIONS ON NETWORKING , 1999
"... This paper considers the potentially negative impacts of an increasing deployment of non-congestion-controlled best-effort traffic on the Internet.’ These negative impacts range from extreme unfairness against competing TCP traffic to the potential for congestion collapse. To promote the inclusion ..."
Abstract - Cited by 875 (14 self) - Add to MetaCart
This paper considers the potentially negative impacts of an increasing deployment of non-congestion-controlled best-effort traffic on the Internet.’ These negative impacts range from extreme unfairness against competing TCP traffic to the potential for congestion collapse. To promote the inclusion

Xen and the art of virtualization

by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield - IN SOSP , 2003
"... Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security or fun ..."
Abstract - Cited by 2010 (35 self) - Add to MetaCart
or functionality for speed. Few offer resource isolation or performance guarantees; most provide only best-effort provisioning, risking denial of service. This paper presents Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource

Modern Information Retrieval

by Ricardo Baeza-Yates, Berthier Ribeiro-Neto , 1999
"... Information retrieval (IR) has changed considerably in the last years with the expansion of the Web (World Wide Web) and the advent of modern and inexpensive graphical user interfaces and mass storage devices. As a result, traditional IR textbooks have become quite out-of-date which has led to the i ..."
Abstract - Cited by 3233 (29 self) - Add to MetaCart
Information retrieval (IR) has changed considerably in the last years with the expansion of the Web (World Wide Web) and the advent of modern and inexpensive graphical user interfaces and mass storage devices. As a result, traditional IR textbooks have become quite out-of-date which has led

COMA - A system for flexible combination of Schema Matching Approaches

by Hong-hai Do, Erhard Rahm - In VLDB , 2002
"... Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data sources, data warehouse loading and XML message mapping. To reduce the amount of user effort as much as possible, automati ..."
Abstract - Cited by 443 (12 self) - Add to MetaCart
Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data sources, data warehouse loading and XML message mapping. To reduce the amount of user effort as much as possible

Technological pedagogical content knowledge: A framework for integrating technology in teacher knowledge.

by M J Koehler , P Mishra - Teachers College Record, , 2006
"... Abstract This paper describes a framework for teacher knowledge for technology integration called technological pedagogical content knowledge (originally TPCK, now known as TPACK, or technology, pedagogy, and content knowledge). This framework builds on Lee Shulman's construct of pedagogical c ..."
Abstract - Cited by 420 (19 self) - Add to MetaCart
technologies present to teachers. In our work, the word technology applies equally to analog and digital, as well as new and old, technologies. As a matter of practical significance, however, most of the technologies under consideration in current literature are newer and digital and have some inherent

Benchmarking Optimization Software with Performance Profiles

by Elizabeth D. Dolan, Jorge J. Moré , 2001
"... We propose performance profiles --- distribution functions for a performance metric --- as a tool for benchmarking and comparing optimization software. We show that performance profiles combine the best features of other tools for performance evaluation. 1 Introduction The benchmarking of optimi ..."
Abstract - Cited by 386 (8 self) - Add to MetaCart
of optimization software has recently gained considerable visibility. Hans Mittlemann's [13] work on a variety of optimization software has frequently uncovered deficiencies in the software and has generally led to software improvements. Although Mittelmann's efforts have gained the most notice, other

Tabu Search -- Part II

by Fred Glover , 1990
"... This is the second half of a two part series devoted to the tabu search metastrategy for optimization problems. Part I introduced the fundamental ideas of tabu search as an approach for guiding other heuristics to overcome the limitations of local optimality, both in a deterministic and a probabilis ..."
Abstract - Cited by 387 (5 self) - Add to MetaCart
probabilistic framework. Part I also reported successful applications from a wide range of settings, in which tabu search frequently made it possible to obtain higher quality solutions than previously obtained with competing strategies, generally with less computational effort. Part 11, in this issue, examines

Internet Quarantine: Requirements for Containing Self-Propagating Code

by David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage , 2003
"... It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such "worm" outbreaks. For example, the Code-Red worm ..."
Abstract - Cited by 324 (10 self) - Add to MetaCart
epidemics of 2001 infected hundreds of thousands of Internet hosts in a very short period -- incurring enormous operational expense to track down, contain, and repair each infected machine. In response to this threat, there is considerable effort focused on developing technical means for detecting

Labor supply flexibility and portfolio choice in a life cycle model

by Zvi Bodie, Robert C. Merton, William F. Samuelson , 1992
"... This paper examines the effect of the labor-leisure choice on portfolio and consumption decisions over an individual’s life cycle. The model incorporates the fact that individuals may have considerable flexibility in varying their work effort (including their choice of when to retire). Given this fl ..."
Abstract - Cited by 353 (8 self) - Add to MetaCart
This paper examines the effect of the labor-leisure choice on portfolio and consumption decisions over an individual’s life cycle. The model incorporates the fact that individuals may have considerable flexibility in varying their work effort (including their choice of when to retire). Given

A Critique of Software Defect Prediction Models

by Norman E. Fenton, Martin Neil - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 1999
"... Many organizations want to predict the number of defects (faults) in software systems, before they are deployed, to gauge the likely delivered quality and maintenance effort. To help in this numerous software metrics and statistical models have been developed, with a correspondingly large literatur ..."
Abstract - Cited by 292 (21 self) - Add to MetaCart
Many organizations want to predict the number of defects (faults) in software systems, before they are deployed, to gauge the likely delivered quality and maintenance effort. To help in this numerous software metrics and statistical models have been developed, with a correspondingly large
Next 10 →
Results 1 - 10 of 10,376
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University