Sciweavers

6240 search results - page 1132 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
NSDI
2007
15 years 4 months ago
The Flexlab Approach to Realistic Evaluation of Networked Systems
Networked systems are often evaluated on overlay testbeds such as PlanetLab and emulation testbeds such as Emulab. Emulation testbeds give users great control over the host and ne...
Robert Ricci, Jonathon Duerig, Pramod Sanaga, Dani...
LREC
2010
150views Education» more  LREC 2010»
15 years 3 months ago
Design, Compilation, and Preliminary Analyses of Balanced Corpus of Contemporary Written Japanese
Compilation of a 100 million words balanced corpus called the Balanced Corpus of Contemporary Written Japanese (or BCCWJ) is underway at the National Institute for Japanese Langua...
Kikuo Maekawa, Makoto Yamazaki, Takehiko Maruyama,...
ICWS
2008
IEEE
15 years 3 months ago
A Framework for Verifying SLA Compliance in Composed Services
Service level agreements (SLAs) impose many nonfunctional requirements on services. Business analysts specify and check these requirements in business process models using tools s...
Hua Xiao, Brian Chan, Ying Zou, Jay W. Benayon, Bi...
CSREASAM
2006
15 years 3 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
134
Voted
CMS
2010
150views Communications» more  CMS 2010»
15 years 1 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
« Prev « First page 1132 / 1248 Last » Next »