Sciweavers

2057 search results - page 151 / 412
» From content distribution networks to content networks - iss...
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
CONEXT
2009
ACM
13 years 6 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
AI
2000
Springer
14 years 21 days ago
Keep It Simple: A Case-Base Maintenance Policy Based on Clustering and Information Theory
Abstract. Today’s case based reasoning applications face several challenges. In a typical application, the case bases grow at a very fast rate and their contents become increasin...
Qiang Yang, Jing Wu
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
14 years 2 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
CEAS
2006
Springer
14 years 2 days ago
Breaking Anti-Spam Systems with Parasitic Spam
The existance of networks of `bots' raises the possibility of a new type of spam that breaks the current paradigm of spam defense, in which the defence acts purely as a filte...
Morton Swimmer, Ian Whalley, Barry Leiba, Nathanie...