Sciweavers

1748 search results - page 291 / 350
» Security Models for Heterogeneous Networking
Sort
View
SIGIR
1996
ACM
15 years 7 months ago
Retrieval of Complex Objects Using a Four-Valued Logic
The aggregated structure of documents plays a key role in full-text, multimedia, and network Information Retrieval (IR). Considering aggregation provides new querying facilities a...
Thomas Rölleke, Norbert Fuhr
139
Voted
CONEXT
2006
ACM
15 years 7 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
CCR
2002
111views more  CCR 2002»
15 years 3 months ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
SAINT
2006
IEEE
15 years 9 months ago
PaxonDHT: Achieving Consensus in Distributed Hash Tables
Despite the scalability, availability and resiliency potential suggested by Distributed Hash Tables, their lack of support for replication of mutable data and for strong consisten...
Ben Temkow, Anne-Marie Bosneag, Xinjie Li, Monica ...
MM
2009
ACM
233views Multimedia» more  MM 2009»
15 years 8 months ago
Enhancing semantic and geographic annotation of web images via logistic canonical correlation regression
Photo community sites such as Flickr and Picasa Web Album host a massive amount of personal photos with millions of new photos uploaded every month. These photos constitute an ove...
Liangliang Cao, Jie Yu, Jiebo Luo, Thomas S. Huang