Sciweavers

4049 search results - page 801 / 810
» Neural Network Trainer through Computer Networks
Sort
View
ICDE
2008
IEEE
127views Database» more  ICDE 2008»
15 years 11 months ago
Querying Data under Access Limitations
Data sources on the web are often accessible through web interfaces that present them as relational tables, but require certain attributes to be mandatorily selected, e.g., via a w...
Andrea Calì, Davide Martinenghi
WWW
2003
ACM
15 years 10 months ago
Evolving the Semantic Web with Mangrove
Despite numerous proposals for its creation, the semantic web has yet to achieve widespread adoption. Recently, some researchers have argued that participation in the semantic web...
Luke McDowell, Oren Etzioni, Steven D. Gribble, Al...
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
15 years 6 months ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...
INFOCOM
2009
IEEE
15 years 4 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
INFOCOM
2009
IEEE
15 years 4 months ago
CFP: Cooperative Fast Protection
—We introduce a novel protection scheme, called Cooperative Fast Protection (CFP), to fight against a single link failure in survivable WDM (Wavelength Division Multiplexing) mes...
Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Ta...