Sciweavers

101 search results - page 20 / 21
» Exploring Ink Spreading
Sort
View
84
Voted
CCS
2010
ACM
14 years 12 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe
CORR
2010
Springer
85views Education» more  CORR 2010»
14 years 11 months ago
Pushing BitTorrent Locality to the Limit
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, i...
Stevens Le-Blond, Arnaud Legout, Walid Dabbous
CORR
2007
Springer
89views Education» more  CORR 2007»
14 years 11 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
MICRO
2007
IEEE
113views Hardware» more  MICRO 2007»
14 years 11 months ago
The High Cost of a Cheap Lesson
y abstract, it is grounded in the experience of many markets. As I will illustrate, it explains much strategic behavior. Information spreads With a bit of effort, any technically s...
Shane Greenstein
PVLDB
2008
82views more  PVLDB 2008»
14 years 11 months ago
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering
Trajectory classification, i.e., model construction for predicting the class labels of moving objects based on their trajectories and other features, has many important, real-worl...
Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hector Gonzal...