Sciweavers

2725 search results - page 406 / 545
» A framework for P2P application development
Sort
View

Publication
165views
17 years 1 months ago
A Survey of the Use-It-Or-Lose-It Policies for the ABR Service in ATM Networks
The Available Bit Rate (ABR) service has been developed to support data applications over Asynchronous Transfer Mode (ATM). The ABR service uses a closed-loop rate-based traffic ma...
Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Son...
WWW
2008
ACM
16 years 4 months ago
Using CEP technology to adapt messages exchanged by web services
Web service may be unable to interact with each other because of incompatibilities between their interfaces. In this paper, we present an event driven approach which aims at adapt...
Yehia Taher, Marie-Christine Fauvet, Marlon Dumas,...
WWW
2007
ACM
16 years 4 months ago
Identifying and discriminating between web and peer-to-peer traffic in the network core
Traffic classification is the ability to identify and categorize network traffic by application type. In this paper, we consider the problem of traffic classification in the netwo...
Jeffrey Erman, Anirban Mahanti, Martin F. Arlitt, ...
161
Voted
PERCOM
2009
ACM
16 years 4 months ago
RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation
Abstract--The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the deve...
Vikram P. Munishwar, Shailendra Singh 0003, Christ...
EDBT
2004
ACM
234views Database» more  EDBT 2004»
16 years 3 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu