Sciweavers

1498 search results - page 157 / 300
» Collection tree protocol
Sort
View
WOWMOM
2005
ACM
130views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Context-Aware Service Discovery in Heterogeneous Networks
Pervasive environments bring new challenges for service management, as clients have to handle large collections of services offered by concurrent networks at their location, as we...
Pierre-Guillaume Raverdy, Valérie Issarny
ECIR
2007
Springer
15 years 3 months ago
A Retrieval Evaluation Methodology for Incomplete Relevance Assessments
In this paper we a propose an extended methodology for laboratory based Information Retrieval evaluation under incomplete relevance assessments. This new protocol aims to identify ...
Mark Baillie, Leif Azzopardi, Ian Ruthven
CN
1999
56views more  CN 1999»
15 years 2 months ago
Surfing the Web Backwards
From a user's perspective, hypertext links on the web form a directed graph between distinct information sources. We investigate the effects of discovering "backlinks&qu...
Soumen Chakrabarti, David Gibson, Kevin S. McCurle...
JMLR
2006
132views more  JMLR 2006»
15 years 2 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
INFOCOM
2003
IEEE
15 years 7 months ago
Exploring the trade-off between label size and stack depth in MPLS Routing
— Multiprotocol Label Switching or MPLS technology is being increasingly deployed by several of the largest Internet service providers to solve problems such as traffic engineer...
Anupam Gupta, Amit Kumar, Rajeev Rastogi