Sciweavers

483 search results - page 87 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ISMIR
2000
Springer
128views Music» more  ISMIR 2000»
15 years 1 months ago
PROMS: A Web-based Tool for Searching in Polyphonic Music
One major task of a digital music library (DML) is to provide techniques to locate a queried musical pattern in all pieces of music in the database containing that pattern. For a ...
Michael Clausen, R. Engelbrecht, D. Meyer, J. Schm...
INFOCOM
2012
IEEE
12 years 12 months ago
Network optimization for DHT-based applications
—P2P platforms have been criticized because of the heavy strain that some P2P services can inflict on costly interdomain links of network operators. It is therefore necessary to...
Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Gu...
CCS
2006
ACM
15 years 1 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
SIGSOFT
2009
ACM
15 years 4 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...
MSWIM
2005
ACM
15 years 3 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri