Sciweavers

1869 search results - page 341 / 374
» Analysis of Network Processing Workloads
Sort
View
78
Voted
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 5 months ago
Should I Stay or Should I Go? Worker Commitment to Virtual Organizations
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
Yulin Fang, Derrick J. Neufeld
73
Voted
IJCNN
2006
IEEE
15 years 5 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
INFOCOM
2006
IEEE
15 years 5 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
ICITA
2005
IEEE
15 years 5 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 5 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...