Sciweavers

1845 search results - page 305 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
ACL
2003
15 years 2 months ago
Orthogonal Negation in Vector Spaces for Modelling Word-Meanings and Document Retrieval
Standard IR systems can process queries such as “web NOT internet”, enabling users who are interested in arachnids to avoid documents about computing. The documents retrieved ...
Dominic Widdows
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 2 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
SIGCOMM
2010
ACM
15 years 1 months ago
Multi-hop packet tracking for experimental facilities
The Internet has become a complex system with increasing numbers of end-systems, applications, protocols and types of networks. Although we have a good understanding of how data i...
Tacio Santos, Christian Henke, Carsten Schmoll, Ta...
CN
2007
94views more  CN 2007»
15 years 1 months ago
Modeling and generating realistic streaming media server workloads
Currently, Internet hosting centers and content distribution networks leverage statistical multiplexing to meet the performance requirements of a number of competing hosted networ...
Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vah...
JCO
2006
67views more  JCO 2006»
15 years 1 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong