Sciweavers

431 search results - page 63 / 87
» Automatic configuration of internet services
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 10 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
WWW
2008
ACM
14 years 9 months ago
Web video topic discovery and tracking via bipartite graph reinforcement model
Automatic topic discovery and tracking on web-shared videos can greatly benefit both web service providers and end users. Most of current solutions of topic detection and tracking...
Lu Liu, Lifeng Sun, Yong Rui, Yao Shi, Shiqiang Ya...
WCW
2004
Springer
14 years 2 months ago
A Scalable Channel-Based Multi-source Content Distribution System
Aiming at improving file download speed, existing large-scale P2P content distribution systems substantially employ a multi-source parallel downloading scheme to allow peers servi...
Pei Zheng, Chen Wang Xeja
WWW
2009
ACM
14 years 9 months ago
Competitive analysis from click-through log
Existing keyword suggestion tools from various search engine companies could automatically suggest keywords related to the advertisers' products or services, counting in simp...
Gang Wang, Jian Hu, Yunzhang Zhu, Hua Li, Zheng Ch...
SEMWEB
2009
Springer
14 years 3 months ago
Live Social Semantics
Abstract. Social interactions are one of the key factors to the success of conferences and similar community gatherings. This paper describes a novel application that integrates da...
Harith Alani, Martin Szomszor, Ciro Cattuto, Woute...