Sciweavers

13966 search results - page 2693 / 2794
» The Internet a
Sort
View
DSN
2007
IEEE
15 years 5 months ago
Bounding Peer-to-Peer Upload Traffic in Client Networks
Peer-to-peer technique has now become one of the major techniques to exchange digital content between peers of the same interest. However, as the amount of peer-topeer traffic inc...
Chun-Ying Huang, Chin-Laung Lei
CIVR
2010
Springer
215views Image Analysis» more  CIVR 2010»
15 years 5 months ago
Multi modal semantic indexing for image retrieval
Popular image retrieval schemes generally rely only on a single mode, (either low level visual features or embedded text) for searching in multimedia databases. Many popular image...
Chandrika Pulla, C. V. Jawahar
ICDCS
2010
IEEE
15 years 5 months ago
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
Abstract—We present results from measurements of the filtering of HTTP HTML responses in China, which is based on string matching and TCP reset injection by backbone-level route...
Jong Chun Park, Jedidiah R. Crandall
ICDCS
2010
IEEE
15 years 5 months ago
P2P Streaming Capacity under Node Degree Bound
—Two of the fundamental problems in peer-to-peer (P2P) streaming are as follows: what is the maximum streaming rate that can be sustained for all receivers, and what peering algo...
Shao Liu, Minghua Chen, Sudipta Sengupta, Mung Chi...
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
15 years 5 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
« Prev « First page 2693 / 2794 Last » Next »