Sciweavers

8493 search results - page 1401 / 1699
» Implementing a distributed firewall
Sort
View
JMLR
2006
105views more  JMLR 2006»
15 years 4 months ago
Parallel Software for Training Large Scale Support Vector Machines on Multiprocessor Systems
Parallel software for solving the quadratic program arising in training support vector machines for classification problems is introduced. The software implements an iterative dec...
Luca Zanni, Thomas Serafini, Gaetano Zanghirati
154
Voted
JMM2
2006
140views more  JMM2 2006»
15 years 4 months ago
A Cost-Effective Peer-to-Peer Architecture for Large-Scale On-Demand Media Streaming
This paper presents a cost-effective peer-to-peer (P2P) architecture for large-scale on-demand media streaming, named BitVampire. BitVampire's primary design goal is to aggreg...
Xin Liu, Son T. Vuong
153
Voted
JNW
2006
186views more  JNW 2006»
15 years 4 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
ENTCS
2007
84views more  ENTCS 2007»
15 years 4 months ago
A Rewriting Logic Framework for Soft Constraints
Soft constraints extend classical constraints to deal with non-functional requirements, overconstrained problems and preferences. Bistarelli, Montanari and Rossi have developed a ...
Martin Wirsing, Grit Denker, Carolyn L. Talcott, A...
JSA
2006
113views more  JSA 2006»
15 years 4 months ago
A power-efficient TCAM architecture for network forwarding tables
Stringent memory access and search speed requirements are two of the main bottlenecks in wire speed processing. Most viable search engines are implemented in content addressable m...
Taskin Koçak, Faysal Basci
« Prev « First page 1401 / 1699 Last » Next »