Sciweavers

1404 search results - page 236 / 281
» internet 2010
Sort
View
IEEECIT
2010
IEEE
14 years 8 months ago
Predictive and Dynamic Resource Allocation for Enterprise Applications
—Dynamic resource allocation has the potential to provide significant increases in total revenue in enterprise systems through the reallocation of available resources as the dem...
M. Al-Ghamdi, Adam P. Chester, Stephen A. Jarvis
IEEECIT
2010
IEEE
14 years 8 months ago
A P2P REcommender System based on Gossip Overlays (PREGO)
—Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building an...
Matteo Mordacchini, Ranieri Baraglia, Patrizio Daz...
IEEECIT
2010
IEEE
14 years 8 months ago
The Strategy of Advancing Mobile Web Application's Layout and Drawing
As the time of mobile Internet has come gently, the mobile applications has progressively designed by techniques based on web technology. The web technology has a lot of strong po...
Liankui Qiu, Panlong He, Lei Luo
IJIPT
2010
91views more  IJIPT 2010»
14 years 8 months ago
Detecting and blocking P2P botnets through contact tracing chains
: Peer-to-peer (P2P) botnets have recently become serious security threats on the internet. It is difficult to detect the propagation of P2P botnets by isolated monitoring on indiv...
Zhiyong Huang, Xiaoping Zeng, Yong Liu
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
14 years 8 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...