Sciweavers

8023 search results - page 1512 / 1605
» Internet Technology
Sort
View
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
15 years 11 months ago
Three Case Studies of Large-Scale Data Flows
We survey three examples of large-scale scientific workflows that we are working with at Cornell: the Arecibo sky survey, the CLEO high-energy particle physics experiment, and t...
William Y. Arms, Selcuk Aya, Manuel Calimlim, Jim ...
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
15 years 11 months ago
A Fingerprinting System for Musical Content
Abstract— Driven by the recent advances in digital entertainment technologies, digital multimedia content (such as music and movies) is becoming a major part of the average compu...
Lahouari Ghouti, Ahmed Bouridane, Mohammad K. Ibra...
IWIA
2006
IEEE
15 years 11 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
RTAS
2006
IEEE
15 years 11 months ago
Granularity Aware (m, k) Queue Management for Real-time Media Servers
Real-time media servers are becoming increasingly important as the Internet supports more and more multimedia applications. In order to meet these ever increasing demands, real-ti...
Yingxin Jiang, Aaron Striegel
PDC
2006
ACM
15 years 11 months ago
Oppositional and activist new media: remediation, reconfiguration, participation
Over the last decade, the major firms and cultural institutions that have dominated media and information industries in the U.S. and globally have been challenged by people adopti...
Leah A. Lievrouw
« Prev « First page 1512 / 1605 Last » Next »