Sciweavers

24529 search results - page 4499 / 4906
» Computing on Authenticated Data
Sort
View
MM
2010
ACM
174views Multimedia» more  MM 2010»
15 years 5 months ago
Image classification using the web graph
Image classification is a well-studied and hard problem in computer vision. We extend a proven solution for classifying web spam to handle images. We exploit the link structure of...
Dhruv Kumar Mahajan, Malcolm Slaney
124
Voted
SIGCOMM
2010
ACM
15 years 5 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...
SIGCOMM
2010
ACM
15 years 5 months ago
Internet inter-domain traffic
In this paper, we examine changes in Internet inter-domain traffic demands and interconnection policies. We analyze more than 200 Exabytes of commercial Internet traffic over a tw...
Craig Labovitz, Scott Iekel-Johnson, Danny McPhers...
SIGCOMM
2010
ACM
15 years 5 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
170
Voted
GLOBECOM
2007
IEEE
15 years 5 months ago
Doppler Spread Estimation for Broadband Wireless OFDM Systems
Abstract— In this paper, we present a new Doppler spread estimation algorithm for broadband wireless orthogonal frequency division multiplexing (OFDM) systems with time-varying a...
Jun Tao, Jingxian Wu, Chengshan Xiao
« Prev « First page 4499 / 4906 Last » Next »