Sciweavers

537 search results - page 91 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
NPC
2005
Springer
15 years 3 months ago
Adaptive Query-Caching in Peer-to-Peer Systems
Peer-to-Peer (P2P) architectures are very prevalent in today’s Internet. Lots of P2P file sharing systems using Gnutella protocol emerge out and draw attractions of millions of p...
Zuoning Yin, Hai Jin, Chao Zhang, Quan Yuan, Chuch...
WCW
2004
Springer
15 years 3 months ago
Overhaul: Extending HTTP to Combat Flash Crowds
The increasing use of the web for serving http content, for database transactions, etc. can place heavy stress on servers. Flash crowds can occur at a server when there is a burst ...
Jay A. Patel, Indranil Gupta
ADC
2009
Springer
151views Database» more  ADC 2009»
15 years 1 months ago
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution
Radio Frequency Identification (RFID) technology uses radio-frequency waves to automatically identify people or objects. A large volume of data, resulting from the fast capturing ...
Prapassara Pupunwiwat, Bela Stantic
ASE
2004
167views more  ASE 2004»
14 years 9 months ago
Cluster-Based Partial-Order Reduction
The verification of concurrent systems through an exhaustive traversal of the state space suffers from the infamous state-space-explosion problem, caused by the many interleavings ...
Twan Basten, Dragan Bosnacki, Marc Geilen
PAMI
2010
190views more  PAMI 2010»
14 years 4 months ago
Linear Regression for Face Recognition
In this paper, we present a novel approach of face identification by formulating the pattern recognition problem in terms of linear regression. Using a fundamental concept that pat...
Imran Naseem, Roberto Togneri, Mohammed Bennamoun