Sciweavers

2409 search results - page 412 / 482
» Reverse engineering the Internet
Sort
View
GLOBECOM
2008
IEEE
15 years 7 months ago
Performance Study of the NSIS QoS-NSLP Protocol
—This paper presents an evaluation of the Quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (Next Steps In Signalling) protocol suite. The QoS-NSLP in combinati...
Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer, ...
102
Voted
ICCCN
2008
IEEE
15 years 7 months ago
Improving Load Balancing with Multipath Routing
— Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
108
Voted
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
15 years 7 months ago
Text Cube: Computing IR Measures for Multidimensional Text Database Analysis
Since Jim Gray introduced the concept of ”data cube” in 1997, data cube, associated with online analytical processing (OLAP), has become a driving engine in data warehouse ind...
Cindy Xide Lin, Bolin Ding, Jiawei Han, Feida Zhu,...
102
Voted
ICPR
2008
IEEE
15 years 7 months ago
Re-ranking of web image search results using a graph algorithm
We propose a method to improve the results of image search engines on the Internet to satisfy users who desire to see relevant images in the first few pages. The method re-ranks ...
Hilal Zitouni, Sare Gul Sevil, Derya Ozkan, Pinar ...
COMSWARE
2007
IEEE
15 years 7 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha