Sciweavers

3257 search results - page 598 / 652
» networking 2004
Sort
View
ISSA
2004
14 years 11 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
ISTA
2004
14 years 11 months ago
Evidential Paradigm and Intelligent Mathematical Text Processing
Abstract: This paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evid...
Alexander V. Lyaletski, Anatoly E. Doroshenko, And...
MASCOTS
2004
14 years 11 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
MMNS
2004
106views Multimedia» more  MMNS 2004»
14 years 11 months ago
Content-Based Adaptation of Streamed Multimedia
Most adaptive delivery mechanisms for streaming multimedia content do not explicitly consider user-perceived quality when making adaptation decisions. We show that an optimal adap...
Nicola Cranley, Liam Murphy, Philip Perry
MMNS
2004
161views Multimedia» more  MMNS 2004»
14 years 11 months ago
Adaptive Video Streaming in Presence of Wireless Errors
Real-time video streaming with rate adaptation to network load/congestion represents an efficient solution to its coexistence with conventional TCP data services. Naturally, the st...
Guang Yang 0001, Mario Gerla, Medy Sanadidi