Sciweavers

2715 search results - page 245 / 543
» Network bucket testing
Sort
View
86
Voted
ICMCS
2006
IEEE
92views Multimedia» more  ICMCS 2006»
15 years 6 months ago
A Case for Internet Streaming via Web Servers
Hosting Internet streaming services has its unique challenges. Aiming at making Internet streaming services be widely and easily adopted in practice, in this paper, we have design...
Songqing Chen, Bo Shen, Wai-tian Tan, Susie Wee, X...
90
Voted
ATAL
2005
Springer
15 years 6 months ago
Efficient information retrieval using mobile agents
We are concerned with the use of Mobile Agents for information retrieval. A multi-agent system is considered; a number of agents are involved in a collective effort to retrieve di...
Irene Sygkouna, Miltiades E. Anagnostou
82
Voted
ISI
2004
Springer
15 years 6 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ICPPW
2002
IEEE
15 years 5 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufď¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
115
Voted
ETFA
2008
IEEE
15 years 2 months ago
Efficient failure-free foundry production
Microshrinkages are known as probably the most difficult defects to avoid in high-precission foundry. Depending on the magnitude of this defect, the piece in which it appears must...
Yoseba K. Penya, Pablo Garcia Bringas, Argoitz Zab...