• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,884
Next 10 →

Preventing Internet Denial-of-Service with Capabilities

by Tom Anderson , Timothy Roscoe, David Wetherall - SIGCOMM COMPUT. COMMUN. REV , 2003
"... In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) attacks. Instead of being able to send anything to anyone at any time, in our architecture, nodes must first obtain "permission to send" from the destination; a receiver provides tokens, or capa ..."
Abstract - Cited by 142 (5 self) - Add to MetaCart
, or capabilities, to those senders whose traffic it agrees to accept. The senders then include these tokens in packets. This enables verification points distributed around the network to check that traffic has been certified as legitimate by both endpoints and the path in between, and to cleanly discard

A simple incremental network topology for worhmhole switch-based networks

by Pangfeng Liu, Jan-jan Wu, Yi-fang Lin, Shih-hsien Yeh - In Proceedings of International Parallel and Distributed Processing Symposium , 2001
"... Wormhole switching has become the most widely used switching technique for multicomputers. However, the main drawback of wormhole switching is that blocked messages remain in the network, prohibiting other messages from using the occupied links and buffers. To address the deadlock problem without co ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
compromising communication latency and the incremental expansion capability that irregular networks can offer, we propose a simple topology called Incremental Triangular Mesh (ITM) for switch-based networks. ITM is highly scalable, allows incremental expansion of systems, has guaranteed deadlock freedom

The Influence of Intellectual Capital on the Types of Innovative Capabilities

by Mohan Subramaniam, Mark A. Youndt - Academy of Management Journal , 2005
"... We examined how aspects of intellectual capital influenced various innovative capa-bilities in organizations. In a longitudinal, multiple-informant study of 93 organiza-tions, we found that human, organizational, and social capital and their interrelation-ships selectively influenced incremental and ..."
Abstract - Cited by 133 (1 self) - Add to MetaCart
We examined how aspects of intellectual capital influenced various innovative capa-bilities in organizations. In a longitudinal, multiple-informant study of 93 organiza-tions, we found that human, organizational, and social capital and their interrelation-ships selectively influenced incremental

A DoS-limiting network architecture

by Xiaowei Yang - In Proceedings of ACM SIGCOMM , 2005
"... We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on capabilities in which senders obtain short-term authorizations from receivers that they stamp on their packets. We address ..."
Abstract - Cited by 191 (6 self) - Add to MetaCart
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on capabilities in which senders obtain short-term authorizations from receivers that they stamp on their packets. We address

Exploitation, exploration, and process management: The productivity dilemma revisited

by Mary J. Benner, Michael L. Tushman - Academy of Management Review , 2003
"... Organization and strategy research has stressed the need for organizations to simultaneously exploit existing capabilities while developing new ones. Yet this increasingly crucial challenge has been accompanied by an ongoing wave of managerial activity and institutional pressures for process managem ..."
Abstract - Cited by 192 (7 self) - Add to MetaCart
in stable contexts, they are fundamentally inconsistent with all but incremental innovation and change. We argue that process management activities must be buffered from exploratory activities. As dynamic capabilities are rooted in both exploitative and exploratory activities, ambidextrous organizational

Large-scale Incremental Processing Using Distributed Transactions and Notifications

by Daniel Peng, Frank Dabek, Google Inc - 9th USENIX Symposium on Operating Systems Design and Implementation
"... Updating an index of the web as documents are crawled requires continuously transforming a large repository of existing documents as new documents arrive. This task is one example of a class of data processing tasks that transform a large repository of data via small, independent mutations. These ta ..."
Abstract - Cited by 120 (0 self) - Add to MetaCart
. These tasks lie in a gap between the capabilities of existing infrastructure. Databases do not meet the storage or throughput requirements of these tasks: Google’s indexing system stores tens of petabytes of data and processes billions of updates per day on thousands of machines. MapReduce and other batch

Planning by Incremental Dynamic Programming

by Richard S. Sutton - In Proceedings of the Eighth International Workshop on Machine Learning , 1991
"... This paper presents the basic results and ideas of dynamic programming as they relate most directly to the concerns of planning in AI. These form the theoretical basis for the incremental planning methods used in the integrated architecture Dyna. These incremental planning methods are based on conti ..."
Abstract - Cited by 73 (3 self) - Add to MetaCart
This paper presents the basic results and ideas of dynamic programming as they relate most directly to the concerns of planning in AI. These form the theoretical basis for the incremental planning methods used in the integrated architecture Dyna. These incremental planning methods are based

Visual Query Expansion via Incremental Hypernetwork Models of Image and Text

by Min-oh Heo, Myunggu Kang, Byoung-tak Zhang
"... Abstract. Humans can associate vision and language modalities and thus generate mental imagery, i.e. visual images, from linguistic input in an environment of unlimited inflowing information. Inspired by human memory, we separate a text-to-image retrieval task into two steps: 1) text-to-image conver ..."
Abstract - Add to MetaCart
-to-image conversion (generating visual queries for the 2 step) and 2) image-to-image retrieval task. This separation is advantageous for inner representation visualization, learning incremental dataset, using the results of content-based image retrieval. Here, we propose a visual query expansion method that simulates

View-Invariant Representation and Recognition of Actions

by Cen Rao, Alper Yilmaz, Mubarak Shah , 2002
"... Analysis of human perception of motion shows that information for representing the motion is obtained from the dramatic changes in the speed and direction of the trajectory. In this paper, we present a computational representation of human action to capture these dramatic changes using spatio-tempor ..."
Abstract - Cited by 168 (10 self) - Add to MetaCart
-temporal curvature of 2-D trajectory. This representation is compact, view-invariant, and is capable of explaining an action in terms of meaningful action units called dynamic instants and intervals. A dynamic instant is an instantaneous entity that occurs for only one frame, and represents an important change

Exploiting open functionality in sms-capable cellular networks

by William Enck, Patrick Traynor, Patrick Mcdaniel, Thomas La Porta - In Proceedings of the ACM Conference on Computer and Communication Security (CCS , 2005
"... Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications co ..."
Abstract - Cited by 97 (12 self) - Add to MetaCart
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless subscribers. To encourage the expansion of this new service, telecommunications
Next 10 →
Results 11 - 20 of 3,884
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University