Sciweavers

5723 search results - page 1068 / 1145
» Managing the network
Sort
View
108
Voted
SIGUCCS
2000
ACM
15 years 4 months ago
On the Road to Becoming a Statewide ISP
This paper discusses the technical and policy issues that West Virginia Network (WVNET) encountered when it expanded its statewide Internet dialup service through an outsourcing p...
Roman Olynyk
113
Voted
LISA
2007
15 years 3 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
EDBT
2010
ACM
185views Database» more  EDBT 2010»
15 years 2 months ago
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space
The availability of indoor positioning renders it possible to deploy location-based services in indoor spaces. Many such services will benefit from the efficient support for k n...
Bin Yang 0002, Hua Lu, Christian S. Jensen
108
Voted
CEAS
2008
Springer
15 years 2 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
CIKM
2008
Springer
15 years 2 months ago
Learning a two-stage SVM/CRF sequence classifier
Learning a sequence classifier means learning to predict a sequence of output tags based on a set of input data items. For example, recognizing that a handwritten word is "ca...
Guilherme Hoefel, Charles Elkan
« Prev « First page 1068 / 1145 Last » Next »