Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
134 views114 votes15 years 4 months ago ECIS 2000»
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
101 views118 votes15 years 7 months ago NOMS 2000»
Mobile agent frameworks have attracted a lot of attention in recent years, seen as counterparts of static distributed object frameworks but allowing also for object or agent mobil...
The term Tele-Immersion was first used in October 1996 as the title of a workshop the Electronic Visualization Laboratory (EVL) at University of Illinois at Chicago (UIC) organize...
—P2P streaming has attracted much attention recently with promises for higher revenues and better load distribution. Still, the majority of P2P video streaming systems today empl...
125 views126 votes14 years 9 months ago JDCTA 2010»
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
243 views257 votes13 years 5 months ago SIGIR 2012»
As ever-larger training sets for learning to rank are created, scalability of learning has become increasingly important to achieving continuing improvements in ranking accuracy [...
238 views130 votes15 years 9 months ago ANSS 2007»
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity ...
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...