Sciweavers

2956 search results - page 522 / 592
» Targeted Data Prefetching
Sort
View
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 8 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
132
Voted
MOBICOM
2006
ACM
15 years 8 months ago
Routing algorithms for delay-insensitive and delay-sensitive applications in underwater sensor networks
Underwater sensor networks consist of sensors and vehicles deployed to perform collaborative monitoring tasks over a given region. Underwater sensor networks will find applicatio...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
128
Voted
SACMAT
2006
ACM
15 years 8 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
CIMCA
2005
IEEE
15 years 8 months ago
Topic-Based Audience Metrics for Internet Marketing by Combining Ontologies and Output Page Mining
In Internet marketing, Web audience analysis is essential to understanding the visitors’ needs. However, the existing analysis tools fail to deliver summarized and conceptual me...
Jean-Pierre Norguet, Esteban Zimányi
116
Voted
MMMACNS
2005
Springer
15 years 8 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight