Sciweavers

365 search results - page 56 / 73
» Determining Internet Users' Values for Private Information
Sort
View
89
Voted
WWW
2005
ACM
15 years 10 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
SIGIR
2010
ACM
15 years 1 months ago
Where to start filtering redundancy?: a cluster-based approach
Novelty detection is a difficult task, particularly at sentence level. Most of the approaches proposed in the past consist of re-ordering all sentences following their novelty sco...
Ronald T. Fernández, Javier Parapar, David ...
SERA
2007
Springer
15 years 3 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
SIES
2007
IEEE
15 years 3 months ago
Process Oriented Power Management
— Though modern operating systems have a capable of controlling the power consumption using the DVFS (Dynamic Voltage and Frequency Scaling) mechanism, it is controlled for some ...
Daisuke Miyakawa, Yutaka Ishikawa
75
Voted
CN
2004
122views more  CN 2004»
14 years 9 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee