Sciweavers

1202 search results - page 203 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
82
Voted
JTAER
2006
68views more  JTAER 2006»
15 years 1 months ago
Indigenous People on the Web
This paper explores the ways in which Indigenous people around the world are participating in the World Wide Web, through establishing their own websites or accessing services via...
Laurel Evelyn Dyson, Jim Underwood
IJISEC
2007
87views more  IJISEC 2007»
15 years 1 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
TPDS
2008
75views more  TPDS 2008»
15 years 1 months ago
Performance-Guided Load (Un)balancing under Autocorrelated Flows
Size-based policies have been shown in the literature to effectively balance load and improve performance in cluster environments. Size-based policies assign jobs to servers based...
Qi Zhang, Ningfang Mi, Alma Riska, Evgenia Smirni
121
Voted
JUCS
2007
112views more  JUCS 2007»
15 years 1 months ago
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
: In this paper we propose an application of data mining methods in the prediction of the availability and performance of Internet paths. We deploy a general decision-making method...
Leszek Borzemski
DEBU
2002
161views more  DEBU 2002»
15 years 1 months ago
Indexing and Retrieval of Historical Aggregate Information about Moving Objects
Spatio-temporal databases store information about the positions of individual objects over time. In many applications however, such as traffic supervision or mobile communication ...
Dimitris Papadias, Yufei Tao, Jun Zhang, Nikos Mam...