Sciweavers

4072 search results - page 738 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
IJNSEC
2007
111views more  IJNSEC 2007»
14 years 11 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
DEBU
2000
147views more  DEBU 2000»
14 years 11 months ago
Adaptive Query Processing for Internet Applications
As the area of data management for the Internet has gained in popularity, recent work has focused on effectively dealing with unpredictable, dynamic data volumes and transfer rate...
Zachary G. Ives, Alon Y. Levy, Daniel S. Weld, Dan...
IPPS
2010
IEEE
14 years 9 months ago
Head-body partitioned string matching for Deep Packet Inspection with scalable and attack-resilient performance
Abstract--Dictionary-based string matching (DBSM) is a critical component of Deep Packet Inspection (DPI), where thousands of malicious patterns are matched against high-bandwidth ...
Yi-Hua E. Yang, Viktor K. Prasanna, Chenqian Jiang
ICPR
2000
IEEE
16 years 9 days ago
Visual Extraction of Motion-Based Information from Image Sequences
We describe a system which is designed to assist in extracting high-level information from sets or sequences of images. We show that the method of principal components analysis fo...
David P. Gibson, Neill W. Campbell, Colin J. Dalto...
WWW
2001
ACM
15 years 12 months ago
Support concepts for Web navigation: a cognitive engineering approach
Current Network User Interfaces (NUIs) provide entrances to an enormous amount of Web-based services, bringing about new use problems such as laborious and unsuccessful navigation...
Mark A. Neerincx, Jasper Lindenberg, Steven Pember...