Sciweavers

738 search results - page 133 / 148
» Comparison of Approaches to Service Deployment
Sort
View
CIKM
2008
Springer
13 years 10 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
NETWORK
2007
163views more  NETWORK 2007»
13 years 8 months ago
A Cross-Layering Design for IPv6 Fast Handover Support in an IEEE 802.16e Wireless MAN
Broadband wireless access networks, such as the IEEE 802.16 standard for wireless metropolitan area networks (WMANs), aim to provide high bandwidth, low-cost, scalable solutions t...
Youn-Hee Han, Heejin Jang, JinHyeock Choi, Byungjo...
ICDCS
2008
IEEE
14 years 3 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
ACMACE
2006
ACM
14 years 2 months ago
Wireless home entertainment center: reducing last hop delays for real-time applications
Future digital entertainment services available to home users will share several characteristics: i) they will be deployed and delivered through the Internet, ii) a single media c...
Claudio E. Palazzi, Giovanni Pau, Marco Roccetti, ...
ACMICEC
2005
ACM
156views ECommerce» more  ACMICEC 2005»
14 years 2 months ago
A web services-based business interactions manager to support electronic commerce applications
Electronic commerce applications (e-commerce) need connecting technologies to support the external, agreed-upon or flexible business processes. This requires a specification of th...
Youcef Baghdadi