Sciweavers

14078 search results - page 2695 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
WWW
2004
ACM
16 years 3 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
WWW
2004
ACM
16 years 3 months ago
Visual web mining
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
ICNP
2009
IEEE
15 years 9 months ago
EMS: Encoded Multipath Streaming for Real-time Live Streaming Applications
Abstract—Multipath streaming protocols have recently attracted much attention because they provide an effective means to provide high-quality streaming over the Internet. However...
Alix L. H. Chow, Hao Yang, Cathy H. Xia, Minkyong ...
INFOCOM
2009
IEEE
15 years 9 months ago
CFP: Cooperative Fast Protection
—We introduce a novel protection scheme, called Cooperative Fast Protection (CFP), to fight against a single link failure in survivable WDM (Wavelength Division Multiplexing) mes...
Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Ta...
CHIMIT
2009
ACM
15 years 9 months ago
Network stack diagnosis and visualization tool
End users are often frustrated by unexpected problems while using networked software, leading to frustrated calls to the help desk seeking solutions. However, trying to locate the...
Krist Wongsuphasawat, Pornpat Artornsombudh, Bao N...
« Prev « First page 2695 / 2816 Last » Next »