Sciweavers

9997 search results - page 86 / 2000
» The case for crowd computing
Sort
View
LISA
2007
15 years 5 days ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
CONEXT
2009
ACM
14 years 11 months ago
Content availability and bundling in swarming systems
BitTorrent, the immensely popular file swarming system, suffers a fundamental problem: content unavailability. Although swarming scales well to tolerate flash crowds for popular c...
Daniel Sadoc Menasché, Antonio Augusto de A...
JCS
2008
93views more  JCS 2008»
14 years 9 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
PERVASIVE
2006
Springer
14 years 9 months ago
Collaborative Localization: Enhancing WiFi-Based Position Estimation with Neighborhood Links in Clusters
Abstract. Location-aware services can benefit from accurate and reliable indoor location tracking. The widespread adoption of 802.11x wireless LAN as the network infrastructure cre...
Li-Wei Chan, Ji-Rung Chiang, Yi-Chao Chen, Chia-na...
ACL
2009
14 years 7 months ago
A Non-negative Matrix Tri-factorization Approach to Sentiment Classification with Lexical Prior Knowledge
Sentiment classification refers to the task of automatically identifying whether a given piece of text expresses positive or negative opinion towards a subject at hand. The prolif...
Tao Li, Yi Zhang 0005, Vikas Sindhwani