Sciweavers

2720 search results - page 534 / 544
» Design tools for emerging technologies
Sort
View
116
Voted
TRIDENTCOM
2008
IEEE
15 years 8 months ago
Virtual integrated TCP testbed (VITT)
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
103
Voted
CIKM
2007
Springer
15 years 8 months ago
Recognition and classification of noun phrases in queries for effective retrieval
It has been shown that using phrases properly in the document retrieval leads to higher retrieval effectiveness. In this paper, we define four types of noun phrases and present an...
Wei Zhang, Shuang Liu, Clement T. Yu, Chaojing Sun...
125
Voted
HT
2006
ACM
15 years 7 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
MM
2006
ACM
181views Multimedia» more  MM 2006»
15 years 7 months ago
Peer-to-peer multimedia applications
In both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent...
Jin Li
IWIA
2005
IEEE
15 years 7 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp