Sciweavers

2427 search results - page 467 / 486
» Survivability Computation of Networked Information Systems
Sort
View
MIDDLEWARE
2009
Springer
15 years 6 months ago
Heterogeneous Gossip
Abstract. Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. Loadbalancing is inherent in these protocols a...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
AINA
2005
IEEE
15 years 5 months ago
iHITS: Extending HITS for Personal Interests Profiling
Ever since the boom of World Wide Web, profiling online users' interests has become an important task for content providers. The traditional approach involves manual entry of...
Ziming Zhuang
MUM
2005
ACM
164views Multimedia» more  MUM 2005»
15 years 5 months ago
PhoneGuide: museum guidance supported by on-device object recognition on mobile phones
We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple...
Paul Föckler, Thomas Zeidler, Benjamin Bromba...
CCS
2003
ACM
15 years 5 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
NOSSDAV
2010
Springer
15 years 4 months ago
Towards understanding the external links of video sharing sites: measurement and analysis
Recently, many video sharing sites provide external links so that their video or audio contents can be embedded into external web sites. For example, users can copy the embedded U...
Kunfeng Lai, Dan Wang