Sciweavers

1915 search results - page 41 / 383
» Design and construction of organic computing systems
Sort
View
101
Voted
GROUP
2007
ACM
15 years 4 months ago
Evaluating tagging behavior in social bookmarking systems: metrics and design heuristics
To improve existing social bookmarking systems and to design new ones, researchers and practitioners need to understand how to evaluate tagging behavior. In this paper, we analyze...
Umer Farooq, Thomas George Kannampallil, Yang Song...
MM
2006
ACM
93views Multimedia» more  MM 2006»
15 years 6 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li
86
Voted
CONEXT
2005
ACM
15 years 2 months ago
Increasing the determinism of network emulation to evaluate communication protocols
In this paper, we propose an emulation solution whose purpose is to deal with the need of reproducibility that is encountered in communication protocols evaluation and transport p...
Emmanuel Conchon, Johan Garcia
COMSIS
2007
80views more  COMSIS 2007»
15 years 14 days ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
TEC
2002
166views more  TEC 2002»
15 years 3 days ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...