Sciweavers

2493 search results - page 425 / 499
» A survey of network virtualization
Sort
View
CN
1999
91views more  CN 1999»
14 years 9 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...
ICIP
2010
IEEE
14 years 8 months ago
Auction protocol for camera active control
In this paper, we apply the auction-based theories in economics to camera networks. We develop a set of auction protocols to do camera active control (pan/tilt/zoom) intelligently...
Yiming Li, Bir Bhanu, Wei Lin
IWQOS
2011
Springer
14 years 25 days ago
Dexferizer: A service for data transfer optimization
— We present an approach to optimizing the transfer of data objects within a user’s collection of computers and personal devices, subject to a variety of user-defined quality ...
Ercan Ucan, Timothy Roscoe
NSDI
2008
15 years 8 days ago
DieCast: Testing Distributed Systems with an Accurate Scale Model
Large-scale network services can consist of tens of thousands of machines running thousands of unique software configurations spread across hundreds of physical networks. Testing ...
Diwaker Gupta, Kashi Venkatesh Vishwanath, Amin Va...
JMLR
2006
96views more  JMLR 2006»
14 years 10 months ago
A Hierarchy of Support Vector Machines for Pattern Detection
We introduce a computational design for pattern detection based on a tree-structured network of support vector machines (SVMs). An SVM is associated with each cell in a recursive ...
Hichem Sahbi, Donald Geman