Sciweavers

8468 search results - page 1388 / 1694
» The Technology of Data Stashing
Sort
View
GIR
2006
ACM
15 years 5 months ago
On metonymy recognition for geographic IR
Metonymic location names refer to other, related entities and possess a meaning different from the literal, geographic sense. Metonymic names are to be treated differently to im...
Johannes Leveling, Sven Hartrumpf
IMC
2006
ACM
15 years 5 months ago
binpac: a yacc for writing application protocol parsers
A key step in the semantic analysis of network traffic is to parse the traffic stream according to the high-level protocols it contains. This process transforms raw bytes into s...
Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. ...
IMC
2006
ACM
15 years 5 months ago
Web search clickstreams
Search engines are a vital part of the Web and thus the Internet infrastructure. Therefore understanding the behavior of users searching the Web gives insights into trends, and en...
Nils Kammenhuber, Julia Luxenburger, Anja Feldmann...
INFOSCALE
2006
ACM
15 years 5 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
INFOSCALE
2006
ACM
15 years 5 months ago
Information retrieval in a peer-to-peer environment
Due to rapid information growth, peer-to-peer (P2P) systems have become a promising alternative to centralized, client/server-based approaches for large-scale data sharing. By all...
Dik Lun Lee, Dyce Jing Zhao, Qiong Luo
« Prev « First page 1388 / 1694 Last » Next »