Sciweavers

1122 search results - page 136 / 225
» Information Retrieval in Network Administration
Sort
View
86
Voted
CCS
2008
ACM
15 years 1 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
JUCS
2008
124views more  JUCS 2008»
14 years 11 months ago
Query Transformation Based on Semantic Centrality in Semantic Social Network1
: Query transformation is a serious hurdle on semantic peer-to-peer environment. For interoperability between peers, queries sent from a source peer have to be efficiently transfor...
Jason J. Jung
WSDM
2012
ACM
352views Data Mining» more  WSDM 2012»
13 years 7 months ago
Multi-relational matrix factorization using bayesian personalized ranking for social network data
A key element of the social networks on the internet such as Facebook and Flickr is that they encourage users to create connections between themselves, other users and objects. On...
Artus Krohn-Grimberghe, Lucas Drumond, Christoph F...
BIOADIT
2004
Springer
15 years 5 months ago
Media Streaming on P2P Networks with Bio-inspired Cache Replacement Algorithm
With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata, ...
95
Voted
WSC
2008
15 years 2 months ago
Phrase based browsing for simulation traces of network protocols
Most discrete event simulation frameworks are able to output simulation runs as a trace. The Network Simulator 2 (NS2) is a prominent example that does so to decouple generation o...
Nathan J. Schmidt, Peter Kemper