Sciweavers

79 search results - page 15 / 16
» Bridging the gap between web application firewalls and web a...
Sort
View
ISAAC
2009
Springer
175views Algorithms» more  ISAAC 2009»
15 years 4 months ago
Worst-Case and Smoothed Analysis of k-Means Clustering with Bregman Divergences
The k-means algorithm is the method of choice for clustering large-scale data sets and it performs exceedingly well in practice. Most of the theoretical work is restricted to the c...
Bodo Manthey, Heiko Röglin
CLUSTER
2002
IEEE
15 years 2 months ago
High Performance User Level Sockets over Gigabit Ethernet
While a number of User-Level Protocols have been developed to reduce the gap between the performance capabilities of the physical network and the performance actually available, a...
Pavan Balaji, Piyush Shivam, Pete Wyckoff, Dhabale...
SAC
2004
ACM
15 years 3 months ago
The eduSource Communication Language: implementing open network for learning repositories and services
Interoperability is one of the main issues in creating a networked system of repositories The approaches range from simply forcing one metadata standard on all participating repos...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
MM
2010
ACM
191views Multimedia» more  MM 2010»
14 years 7 months ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
EEE
2005
IEEE
15 years 3 months ago
From Multi-Context Business Collaboration Models to Context-Specific ebXML BPSS
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
Birgit Hofreiter, Christian Huemer