Sciweavers

15421 search results - page 3026 / 3085
» Dependability
Sort
View
ICDM
2010
IEEE
212views Data Mining» more  ICDM 2010»
15 years 2 months ago
Modeling Information Diffusion in Implicit Networks
Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffu...
Jaewon Yang, Jure Leskovec
ICDM
2010
IEEE
197views Data Mining» more  ICDM 2010»
15 years 2 months ago
D-LDA: A Topic Modeling Approach without Constraint Generation for Semi-defined Classification
: D-LDA: A Topic Modeling Approach without Constraint Generation for Semi-Defined Classification Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yuhong Xiong, Zhongzhi Shi HP Labo...
Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yu...
IEEEARES
2010
IEEE
15 years 2 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
IMC
2010
ACM
15 years 2 months ago
Comparing DNS resolvers in the wild
The Domain Name System (DNS) is a fundamental building block of the Internet. Today, the performance of more and more applications depend not only on the responsiveness of DNS, bu...
Bernhard Ager, Wolfgang Mühlbauer, Georgios S...
IMC
2010
ACM
15 years 2 months ago
On the characteristics and reasons of long-lived internet flows
Prior studies of Internet traffic have considered traffic at different resolutions and time scales: packets and flows for hours or days, aggregate packet statistics for days or we...
Lin Quan, John Heidemann
« Prev « First page 3026 / 3085 Last » Next »