Sciweavers

5107 search results - page 1013 / 1022
» Design Issue Of ECTST
Sort
View
CN
2007
91views more  CN 2007»
14 years 9 months ago
On investigating overlay service topologies
Recently, a moderate amount of work has been reported on the use of overlay networks to support value-added network services, such as multicasting, Quality of Service (QoS), secur...
Zhi Li, Prasant Mohapatra
CN
2007
168views more  CN 2007»
14 years 9 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
IR
2006
14 years 9 months ago
A study of mixture models for collaborative filtering
Collaborative filtering is a general technique for exploiting the preference patterns of a group of users to predict the utility of items for a particular user. Three different co...
Rong Jin, Luo Si, Chengxiang Zhai
86
Voted
CSCW
2007
ACM
14 years 9 months ago
Supporting Community Emergency Management Planning through a Geocollaboration Software Architecture
Emergency management is more than just events occurring within an emergency situation. It encompasses a variety of persistent activities such as planning, training, assessment, and...
Wendy A. Schafer, Craig H. Ganoe, John M. Carroll
« Prev « First page 1013 / 1022 Last » Next »