Sciweavers

1733 search results - page 173 / 347
» Web Services: Distributed Applications Without Limits
Sort
View
PERCOM
2003
ACM
16 years 4 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...
158
Voted
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
16 years 5 months ago
Cross domain distribution adaptation via kernel mapping
When labeled examples are limited and difficult to obtain, transfer learning employs knowledge from a source domain to improve learning accuracy in the target domain. However, the...
ErHeng Zhong, Wei Fan, Jing Peng, Kun Zhang, Jiang...
122
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
141
Voted
WWW
2001
ACM
16 years 5 months ago
iMobile: An Agent-Based Platform for Mobile Services
iMobile is a platform that addresses the research issues in building mobile services. iMobile acts as a message gateway that allows mobile devices using various protocols on diffe...
Herman Chung-Hwa Rao, Yih-Farn Chen, Di-Fa Chang, ...
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
14 years 3 days ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...