Sciweavers

1478 search results - page 212 / 296
» Modeling user activities in a large IPTV system
Sort
View
AINA
2004
IEEE
15 years 5 months ago
An Overlay Network Architecture for Data Placement Strategies in a P2P Streaming Network
Abstract--Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them ...
Kan Hung Wan, Chris Loeser
IV
2009
IEEE
114views Visualization» more  IV 2009»
15 years 8 months ago
Chronos: A Tool for Interactive Scheduling and Visualisation of Task Hierarchies
Visualisation and structuring of tasks in a schedule, from relatively simple activities such as meeting scheduling to more complex ones such as project planning, has been traditio...
Saturnino Luz, Masood Masoodian, Daniel McKenzie, ...
SIGCOMM
2009
ACM
15 years 8 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
106
Voted
ACSAC
2006
IEEE
15 years 7 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
EXPDB
2006
ACM
15 years 7 months ago
Performance Study of Rollout for Multi Dimensional Clustered Tables in DB2
In data warehousing applications, the ability to efficiently delete large chunks of data from a table is very important. This feature is also known as Rollout. Rollout is generall...
Bishwaranjan Bhattacharjee