We convert cell-probe lower bounds for polynomial space into stronger lower bounds for near-linear space. Our technique applies to any lower bound proved through the richness meth...
Metadata comes into forefront as a savior of multimedia search and management complexity. However, the existence of the diverse set of metadata standards and the different vocabul...
M. Anwar Hossain, Md. Anisur Rahman, Iluju Kiringa...
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
We report on two experiments performed to test the importance of Term Order in automatic summarisation. Experiment one was undertaken as part of DUC 2004 to which three systems we...