Sciweavers

4435 search results - page 827 / 887
» Algorithms, games, and the internet
Sort
View
FLAIRS
2006
13 years 11 months ago
Learning Personalized Query Modifications
The continuous development of the Internet has resulted in an exponential increase in the amount of available information. A popular way to access this information is by submittin...
Erika E. Torres-Verdín, Manfred Huber
ISSA
2004
13 years 11 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
IJCAI
2001
13 years 11 months ago
Bundle Design in Robust Combinatorial Auction Protocol against False-name Bids
This paper presents a method for designing bundles in a combinatorial auction protocol that is robust against false-name bids. Internet auctions have become an integral part of El...
Makoto Yokoo, Yuko Sakurai, Shigeo Matsubara
MMNS
2004
161views Multimedia» more  MMNS 2004»
13 years 11 months ago
Adaptive Video Streaming in Presence of Wireless Errors
Real-time video streaming with rate adaptation to network load/congestion represents an efficient solution to its coexistence with conventional TCP data services. Naturally, the st...
Guang Yang 0001, Mario Gerla, Medy Sanadidi
NETWORKING
2004
13 years 11 months ago
Multi-objective Egress Router Selection Policies for Inter-domain Traffic with Bandwidth Guarantees
The next generation Internet is designed to accommodate flows that span across multiple domains with quality of service guarantees, in particular bandwidth. In this context, destin...
Kin-Hon Ho, Ning Wang, Panos Trimintzios, George P...