Sciweavers

733 search results - page 119 / 147
» Measurements, Analysis, and Modeling of BitTorrent-like Syst...
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
SSIAI
2002
IEEE
15 years 4 months ago
Tuning JPEG2000 Image Compression for Graphics Regions
The new image compression standard, JPEG2000, provides higher compression rates for the same visual quality for grayscale and color images than JPEG. JPEG2000 is being adopted for...
Serene Banerjee, Brian L. Evans
CLEF
2006
Springer
15 years 3 months ago
A Penalisation-Based Ranking Approach for the Mixed Monolingual Task of WebCLEF 2006
This paper presents an approach of a cross-lingual information retrieval which uses a ranking method based on a penalisation version of the Jaccard formula. The obtained results a...
David Pinto, Paolo Rosso, Ernesto Jiménez
ICSE
2011
IEEE-ACM
14 years 3 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
WWW
2005
ACM
16 years 14 days ago
The semantic webscape: a view of the semantic web
It has been a few years since the semantic Web was initiated by W3C, but its status has not been quantitatively measured. It is crucial to understand the status at this early stag...
Juhnyoung Lee, Richard Goodwin