Sciweavers

8770 search results - page 1636 / 1754
» Named Service Networking
Sort
View
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 5 months ago
Evidences Behind Skype Outage
—Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructur...
Dario Rossi, Marco Mellia, Michela Meo
105
Voted
IEEEIAS
2009
IEEE
15 years 5 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
EPEW
2009
Springer
15 years 5 months ago
Performance of Auctions and Sealed Bids
We develop models of automated E-commerce techniques, which predict the economic outcomes of these decision mechanisms, including the price attained by a good and the resulting inc...
Erol Gelenbe, László Györfi
ERCIMDL
2009
Springer
167views Education» more  ERCIMDL 2009»
15 years 5 months ago
Conceptual Discovery of Educational Resources through Learning Objectives
This poster reports on current work with the NSF-funded Achievement Standards Network (ASN) to support discovery of educational resources in digital libraries using conceptual grap...
Stuart A. Sutton, Diny Golder
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
15 years 5 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
« Prev « First page 1636 / 1754 Last » Next »