Sciweavers

2648 search results - page 478 / 530
» Challenges for Network Computer Games
Sort
View
ICITA
2005
IEEE
14 years 2 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
P2P
2005
IEEE
14 years 2 months ago
Video Management in Peer-to-Peer Systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
ICSOC
2005
Springer
14 years 2 months ago
Handling Faults in Decentralized Orchestration of Composite Web Services
Abstract. Composite web services can be orchestrated in a decentralized manner by breaking down the original service specification into a set of partitions and executing them on a...
Girish Chafle, Sunil Chandra, Pankaj Kankar, Vijay...
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
IUI
2003
ACM
14 years 2 months ago
MovieLens unplugged: experiences with an occasionally connected recommender system
Recommender systems have changed the way people shop online. Recommender systems on wireless mobile devices may have the same impact on the way people shop in stores. We present o...
Bradley N. Miller, Istvan Albert, Shyong K. Lam, J...