Sciweavers

3288 search results - page 632 / 658
» Feed-links for network extensions
Sort
View
70
Voted
IMC
2005
ACM
15 years 7 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
115
Voted
MM
2005
ACM
152views Multimedia» more  MM 2005»
15 years 7 months ago
Critical video quality for distributed automated video surveillance
Large-scale distributed video surveillance systems pose new scalability challenges. Due to the large number of video sources in such systems, the amount of bandwidth required to t...
Pavel Korshunov, Wei Tsang Ooi
BTW
2005
Springer
142views Database» more  BTW 2005»
15 years 7 months ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...
117
Voted
CIKM
2005
Springer
15 years 7 months ago
Feature-based recommendation system
The explosive growth of the world-wide-web and the emergence of e-commerce has led to the development of recommender systems—a personalized information filtering technology use...
Eui-Hong Han, George Karypis
150
Voted
SG
2005
Springer
15 years 7 months ago
Knowledge in the Loop: Semantics Representation for Multimodal Simulative Environments
This article describes the integration of knowledge based techniques into simulative Virtual Reality (VR) applications. The approach is motivated ltimodal Virtual Construction as a...
Marc Erich Latoschik, Peter Biermann, Ipke Wachsmu...