Sciweavers

1300 search results - page 213 / 260
» Toward network data independence
Sort
View
EUROPAR
2003
Springer
15 years 5 months ago
On Transmission Scheduling in a Server-Less Video-on-Demand System
Recently, a server-less video-on-demand architecture has been proposed which can completely eliminate costly dedicated video servers and yet is highly scalable and reliable. Due to...
C. Y. Chan, Jack Y. B. Lee
NLPRS
2001
Springer
15 years 5 months ago
Named Entity Recognition using Machine Learning Methods and Pattern-Selection Rules
Named Entity recognition, as a task of providing important semantic information, is a critical first step in Information Extraction and QuestionAnswering system. This paper propos...
Choong-Nyoung Seon, Youngjoong Ko, Jeong-Seok Kim,...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 4 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
104
Voted
SRDS
1995
IEEE
15 years 4 months ago
Supporting Semantics-Based Transaction Processing in Mobile Database Applications
Advances in computer and telecommunication technologies have made mobile computing a reality. However, greater mobility implies a more tenuous network connection and a higher rate...
Gary D. Walborn, Panos K. Chrysanthis
105
Voted
USS
2008
15 years 2 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach