Sciweavers

442 search results - page 57 / 89
» Technology choice and timing with positive network effects
Sort
View
125
Voted
WWW
2004
ACM
16 years 2 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
ICIS
2004
15 years 3 months ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
IMC
2005
ACM
15 years 7 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
91
Voted
CLEF
2010
Springer
15 years 2 months ago
Patent Classification Experiments with the Linguistic Classification System LCS
In the context of the CLEF-IP 2010 classification task, we conducted a series of experiments with the Linguistic Classification System (LCS). We compared ment representations for p...
Suzan Verberne, Merijn Vogel, Eva D'hondt
139
Voted
TWC
2010
14 years 8 months ago
Robustness analysis and new hybrid algorithm of wideband source localization for acoustic sensor networks
Wideband source localization using acoustic sensor networks has been drawing a lot of research interest recently in wireless communication applications, such as cellular handset lo...
Kun Yan, Hsiao-Chun Wu, S. Sitharama Iyengar