Sciweavers

4435 search results - page 829 / 887
» Algorithms, games, and the internet
Sort
View
COMCOM
2006
117views more  COMCOM 2006»
13 years 10 months ago
End-to-end quality of service provisioning through inter-provider traffic engineering
This paper addresses the issue of delivering solutions that will enable the incremental implementation of inter-domain quality of service (QoS) in the multi-provider commercial In...
Michael P. Howarth, Mohamed Boucadair, Paris Flegk...
COMCOM
2006
96views more  COMCOM 2006»
13 years 10 months ago
Dynamic cache reconfiguration strategies for cluster-based streaming proxy
The high bandwidth and the relatively long-lived characteristics of digital video are key limiting factors in the wide-spread usage of streaming content over the Internet. The pro...
Yang Guo, Zihui Ge, Bhuvan Urgaonkar, Prashant J. ...
ESWA
2006
149views more  ESWA 2006»
13 years 10 months ago
An effective refinement strategy for KNN text classifier
Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an...
Songbo Tan
ENTCS
2007
94views more  ENTCS 2007»
13 years 10 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand
JSAC
2006
137views more  JSAC 2006»
13 years 10 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...