Sciweavers

4435 search results - page 175 / 887
» Networking named content
Sort
View
NOSSDAV
2001
Springer
15 years 9 months ago
Analysis of educational media server workloads
This paper presents an extensive analysis of the client workloads for educational media servers at two major U.S. universities. The goals of the analysis include providing data fo...
Jussara M. Almeida, Jeffrey Krueger, Derek L. Eage...
ALT
2002
Springer
16 years 1 months ago
Data Mining with Graphical Models
Abstract. The explosion of data stored in commercial or administrational databases calls for intelligent techniques to discover the patterns hidden in them and thus to exploit all ...
Rudolf Kruse, Christian Borgelt
TDHMS
2008
15 years 3 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
IEEEIAS
2009
IEEE
15 years 11 months ago
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks
A computer worm is an autonomous malicious, selfreplicating and propagating piece of code that is able to spread fast in computer networks, exploiting the vulnerabilities it disco...
Pantelis Kammas, Thodoros Komninos, Yannis C. Stam...
WWW
2004
ACM
16 years 5 months ago
Is question answering an acquired skill?
We present a question answering (QA) system which learns how to detect and rank answer passages by analyzing questions and their answers (QA pairs) provided as training data. We b...
Ganesh Ramakrishnan, Soumen Chakrabarti, Deepa Par...