Sciweavers

442 search results - page 87 / 89
» A Multi-Relational Network to Support the Scholarly Communic...
Sort
View
IMC
2004
ACM
14 years 29 days ago
An analysis of live streaming workloads on the internet
In this paper, we study the live streaming workload from a large content delivery network. Our data, collected over a 3 month period, contains over 70 million requests for 5,000 d...
Kunwadee Sripanidkulchai, Bruce M. Maggs, Hui Zhan...
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
14 years 24 days ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
C5
2004
IEEE
13 years 11 months ago
Scratch: A Sneak Preview
information technologies as "the ability to reformulate knowledge, to express oneself creatively and appropriately, and to produce and generate information (rather than simply...
John Maloney, Leo Burd, Yasmin B. Kafai, Natalie R...
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 7 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez