Sciweavers

4085 search results - page 757 / 817
» Data Services - From Data to Containers
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
KSEM
2010
Springer
13 years 6 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
MASS
2010
150views Communications» more  MASS 2010»
13 years 6 months ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
13 years 6 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
ACL
2009
13 years 6 months ago
Mining Association Language Patterns for Negative Life Event Classification
Negative life events, such as death of a family member, argument with a spouse and loss of a job, play an important role in triggering depressive episodes. Therefore, it is worth ...
Liang-Chih Yu, Chien-Lung Chan, Chung-Hsien Wu, Ch...