Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
SIGKDD
2000
106views more  SIGKDD 2000»
10 years 1 months ago
Data Mining Models as Services on the Internet
The goal of this article is to raise a debate on the usefulness of providing data mining models as services on the internet. These services can be provided by anyone with adequate...
Sunita Sarawagi, Sree Hari Nagaralu
FIRSTMONDAY
2002
84views more  FIRSTMONDAY 2002»
10 years 1 months ago
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent `Use' at one end to `Cyberterrorism' at the other. Rejecting th...
Maura Conway
CE
2007
104views more  CE 2007»
10 years 1 months ago
The distance from isolation: Why communities are the logical conclusion in e-learning
This paper argues that the internet is built around key technology design features of openness, robustness and decentralisation. These design features have transformed into social...
Martin Weller
COMCOM
2002
93views more  COMCOM 2002»
10 years 1 months ago
Topology-informed Internet replica placement
Recently, several studies have looked into the problem of replicated server placement on the Internet. Some of those studies have demonstrated that there exists a replica placemen...
Pavlin Radoslavov, Ramesh Govindan, Deborah Estrin
CONCURRENCY
2000
123views more  CONCURRENCY 2000»
10 years 1 months ago
A mobile agent based push methodology for global parallel computing
The 1990s are seeing the explosive growth of the Internet and Web-based information sharing and dissemination systems. The Internet is also showing a potential of forming of a sup...
Cheng-Zhong Xu, Brian Wims
CN
2002
116views more  CN 2002»
10 years 1 months ago
Avoiding congestion collapse on the Internet using TCP tunnels
This paper discusses the application of TCP tunnels on the Internet and how Internet traffic can benefit from the congestion control mechanism of the tunnels. Primarily, we show t...
Boon Peng Lee, Rajesh Krishna Balan, Lillykutty Ja...
CCR
2002
130views more  CCR 2002»
10 years 1 months ago
Network topologies, power laws, and hierarchy
It has long been thought that the Internet, and its constituent networks, are hierarchical in nature. Consequently, the network topology generators most widely used by the Interne...
Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Ja...
CN
2004
150views more  CN 2004»
10 years 1 months ago
Optimizing interconnection policies
There are two basic types of interconnection agreements between providers in the Internet: peering and transit. A decision every Internet network service provider (INSP) has to ma...
Oliver Heckmann, Jens Schmitt, Ralf Steinmetz
CN
2004
116views more  CN 2004»
10 years 1 months ago
Towards capturing representative AS-level Internet topologies
Abstract--Recent studies concerning the Internet connectivity at the AS level have attracted considerable attention. These studies have exclusively relied on the BGP data from Oreg...
Hyunseok Chang, Ramesh Govindan, Sugih Jamin, Scot...
CCR
2004
79views more  CCR 2004»
10 years 1 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...
books